The Internet of Insecure Things - 10 Most Wanted List
Offered By: YouTube
Course Description
Overview
Syllabus
The Internet Of Insecure Things: 10 Most Wanted List
Things About Paul
Things About This Presentation
Its More About...
Embedded Systems
Consumer
People cared when...
Care more now?
Why Do We Care? Privacy.
Things are real
Industrial Control Systems
Corporate
Medical
More Already Happening
If I Had To Pick One Example....
Inside Joel's Backdoor
Background
Exemplify Problem Areas
Why Joel Did This?
Russians Found It First
Exploit Is Simple
Canadians & Chinese
Remote Exploitation Via Browser
DIR-100 Butter Overflow
Multi-Stage Dropper MIPS Shellcode
Let's Recap
Owning D-Link?
What Do We Do About It?
Firmware Backdoors
Backdoor password was...
Default Credentials
Insecure Remote Management
Open-Source drivers
Functions prone to overflow
Funny Thing About Encryption
Firmware Encryption
User Friendly Firmware Updates
Secure Web Frameworks
Maintain a CIRT
Secure Protocols
Related Courses
I Boot when U-Bootnullcon via YouTube Attacking IOBluetoothFamily HCI and Vendor-Specific Commands
Black Hat via YouTube Breaking Through Another Side - Bypassing Firmware Security Boundaries from Embedded Controller
Black Hat via YouTube Securing Your In-Ear Fitness Coach - Challenges in Hardening Next Generation Wearables
Black Hat via YouTube My Threat Model is Your Threat Model
RSA Conference via YouTube