Completed
Background
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Hacking Video Conferencing Systems
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Agenda
- 3 Background
- 4 Revenue Market Share
- 5 Polycom HDX Systems
- 6 Attack Surface
- 7 Firmware Analysis
- 8 PUP File Structure
- 9 PUP Header
- 10 Header HMAC
- 11 Public Key DSA Signature
- 12 HDX Boot Modes
- 13 Enabling Development Mode
- 14 Polycom Command Shell
- 15 Device Rooting - Method #2
- 16 Problems with previous Methods
- 17 Device Rooting - Method #3
- 18 System Architecture
- 19 Filesystem
- 20 Configuration Files
- 21 Main Processes
- 22 AppMain Java Process
- 23 Polycom AVC
- 24 Remote Debugging
- 25 Watchdog Daemon
- 26 Ready for Bug Hunting...
- 27 H.323 Protocol
- 28 H.323 Signaling Protocols
- 29 Call Initiation
- 30 Call Detail Records
- 31 Vulnerabilities
- 32 SQL Injection Exploit Challenges
- 33 Vulnerability #2
- 34 Exploiting the Format String Bug
- 35 Post Exploitation
- 36 Polycom XCOM IPC
- 37 Polycom Disclosure Process