The Internet of Insecure Things - 10 Most Wanted List
Offered By: YouTube
Course Description
Overview
Syllabus
The Internet Of Insecure Things: 10 Most Wanted List
Things About Paul
Things About This Presentation
Its More About...
Embedded Systems
Consumer
People cared when...
Care more now?
Why Do We Care? Privacy.
Things are real
Industrial Control Systems
Corporate
Medical
More Already Happening
If I Had To Pick One Example....
Inside Joel's Backdoor
Background
Exemplify Problem Areas
Why Joel Did This?
Russians Found It First
Exploit Is Simple
Canadians & Chinese
Remote Exploitation Via Browser
DIR-100 Butter Overflow
Multi-Stage Dropper MIPS Shellcode
Let's Recap
Owning D-Link?
What Do We Do About It?
Firmware Backdoors
Backdoor password was...
Default Credentials
Insecure Remote Management
Open-Source drivers
Functions prone to overflow
Funny Thing About Encryption
Firmware Encryption
User Friendly Firmware Updates
Secure Web Frameworks
Maintain a CIRT
Secure Protocols
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube