What The Fax?
Offered By: Cooper via YouTube
Course Description
Overview
Explore the security vulnerabilities of fax machines in this 45-minute conference talk from Hack.lu 2018. Delve into the history of fax technology and its surprising persistence in modern times. Examine the security implications of fax usage and learn about potential attack vectors. Follow along as the speakers demonstrate debugging techniques for hardware and software components. Discover the intricacies of JPEG compression and its role in exploiting fax vulnerabilities. Analyze real-world examples, including CVE-2018-5924 and CVE-2018-5925, and understand mitigation bypass techniques. Gain valuable insights into the unexpected security risks posed by this seemingly outdated technology and consider the broader implications for network security.
Syllabus
Intro
FAXHistory
Back To The Future
The Security View
FAXAttack
How can we Debug it?
Breaking HW
Sections
WhatISThis?!
Let's Take A Look
APattern?!
DifferentAngle
The MissingLink
Softdisk
TheUndebuggable
Lucky Break
Debugging Challenges
Scout
Vulnerability
JPEG
Mitigation Bypass
CVE-2018-5924 CVE-2018-5925
Conclusions
Taught by
Cooper
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network