YoVDO

Subverting Your Server Through Its BMC - The HPE iLO4 Case

Offered By: Recon Conference via YouTube

Tags

REcon Conference Courses Server Security Courses Attack Surface Analysis Courses

Course Description

Overview

Explore a deep dive security study of HP's iLO4 server management solution in this 49-minute conference talk from Recon Brussels 2018. Discover the intricacies of firmware unpacking, GreenHills OS Integrity internals, and vulnerability exploitation in HP ProLiant Gen8 and Gen9 servers. Learn about kernel object models, virtual memory, and process isolation. Examine the exposed attack surface through www and ssh protocols. Witness a demonstration of a novel exploitation technique that compromises the host server operating system via DMA. Gain insights from security researchers Alexandre Gazet, Joffrey Czarny, and Fabien Perigaud as they share their findings on subverting servers through the Baseboard Management Controller (BMC) in the HPE iLO4 case study.

Syllabus

Recon Brussels 2018 - Subverting your server through its BMC: the HPE iLO4 case


Taught by

Recon Conference

Related Courses

Administering and Monitoring Atlassian Bamboo
Pluralsight
NGINX Fundamentals: High Performance Servers from Scratch
Udemy
The Complete Ubuntu Linux Server Administration Course 2023.
Udemy
Ethical Hacking | Metasploit Tutorial | من الصفر للاحتراف
Udemy
Administering Microsoft SQL Server 2012 Databases - 70-462
Udemy