YoVDO

Walk Through Access Control Systems

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Data Analysis Courses Edge Computing Courses Privilege Escalation Courses

Course Description

Overview

Explore the vulnerabilities in biometric access control systems during this 48-minute conference talk from the Hack In The Box Security Conference. Delve into the weaknesses of edge computing models and examine technical details of identified vulnerabilities in access control devices. Learn about server command forgery, user arbitrary addition, privilege escalation, man-in-the-middle attacks, and face database exposure. Watch demonstrations on how to leak employee pictures, add unauthorized personnel as administrators, and impersonate back-end servers to open doors and deceive audits. Gain insights from senior threat researchers at Trend Micro as they discuss their findings and implications for security in edge computing environments.

Syllabus

#HITBLockdown002 D2T2 - Walk Through Access Control Systems - Philippe Lin, Roel Reyes & Trend Micro


Taught by

Hack In The Box Security Conference

Related Courses

Browser Hacking With ANGLE
Hack In The Box Security Conference via YouTube
Can A Fuzzer Match A Human
Hack In The Box Security Conference via YouTube
Biometrics System Hacking in the Age of the Smart Vehicle
Hack In The Box Security Conference via YouTube
ICEFALL - Revisiting A Decade Of OT Insecure-By-Design Practices
Hack In The Box Security Conference via YouTube
Fuzzing the MCU of Connected Vehicles for Security and Safety
Hack In The Box Security Conference via YouTube