Completed
Call Initiation
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Hacking Video Conferencing Systems
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Agenda
- 3 Background
- 4 Revenue Market Share
- 5 Polycom HDX Systems
- 6 Attack Surface
- 7 Firmware Analysis
- 8 PUP File Structure
- 9 PUP Header
- 10 Header HMAC
- 11 Public Key DSA Signature
- 12 HDX Boot Modes
- 13 Enabling Development Mode
- 14 Polycom Command Shell
- 15 Device Rooting - Method #2
- 16 Problems with previous Methods
- 17 Device Rooting - Method #3
- 18 System Architecture
- 19 Filesystem
- 20 Configuration Files
- 21 Main Processes
- 22 AppMain Java Process
- 23 Polycom AVC
- 24 Remote Debugging
- 25 Watchdog Daemon
- 26 Ready for Bug Hunting...
- 27 H.323 Protocol
- 28 H.323 Signaling Protocols
- 29 Call Initiation
- 30 Call Detail Records
- 31 Vulnerabilities
- 32 SQL Injection Exploit Challenges
- 33 Vulnerability #2
- 34 Exploiting the Format String Bug
- 35 Post Exploitation
- 36 Polycom XCOM IPC
- 37 Polycom Disclosure Process