I Own Your Building - Management System
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Syllabus
Introduction
What is a BMS?
BMS for end users
What Does a BMS Do?
Building Control Applications
Typical Systems Components - Field Devices
Typical Systems Components - Networks
Interaction With Other Building Management Systems
Typical User Interface Options
BMS Simple User Interfaces - Web Interface
BMS & EDAC
Advertisement - 2019
Security Analysis and Exploitation
Exposure of Management Interface
Software Technology in Controllers
Automatic and Manual Vulnerability Discovery
Obtaining Firmware
Example: Cookie traversal
Example: rootstyle
Backdoors (Development Console)
Example: Java backdoor
Backdoor Access - Optergy
System Access - Linear e Merge E3-Series
System Access - Metasploit Session
System Access - Prima FlexAir #2
Impact
Potential targets (case studies from the vendor)
Upgrade
Taught by
Hack In The Box Security Conference
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network