YoVDO

How to Hack Medical Imaging Applications via DICOM

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Cybersecurity Courses Buffer Overflow Courses Security Vulnerabilities Courses Fuzzing Courses

Course Description

Overview

Explore the world of medical imaging security in this 26-minute conference talk from the Hack In The Box Security Conference. Dive into a comprehensive security analysis of popular DICOM servers, protocols, and libraries used in medical imaging systems. Discover critical vulnerabilities in the DICOM ecosystem, learn how to identify and exploit these security flaws, and understand the importance of rapid bug fixing. Gain insights into successful strategies for uncovering weaknesses in medical imaging applications, with a focus on NVIDIA CLARA, SimpleITK, ORTHANC, DCMTK, and DICOM Network protocols. Follow along as Maria Nedyak, a developer at Bi.Zone and member of the Sibears CTF team, shares her expertise on topics such as heap buffer overflows, insecure APIs, CSRF, XXE, and fuzzing techniques specific to medical imaging systems.

Syllabus

Intro
AISec Team
Medical Imaging
NVIDIA CLARA
SimpleITK: Heap buffer overflow
SimpleITK: Buffer overflow
ORTHANC: IN THE WILD
ORTHANC: Insecure API
ORTHANC: CSRF
DCMTK: XXE
DCMTK: Insecure functionality xml2dcm utility allows to read local files
DICOM Network: Common methods
DICOM Network: Retrieving info
DICOM Network: Fuzzing
DCMTK: Fuzzing
Summary
DICOM: Usage statistics


Taught by

Hack In The Box Security Conference

Related Courses

Advanced White Hat Hacking & Penetration Testing Tutorial
Udemy
Practical Buffer Overflows for OSCP
Udemy
Buffer Overflows Made Easy
Cyber Mentor via YouTube
Burp Suite
David Bombal via YouTube
Buffer Overflows Made Easy - 2022 Edition
Cyber Mentor via YouTube