Hacking Power Management in Data Centers - Security Vulnerabilities and Exploits

Hacking Power Management in Data Centers - Security Vulnerabilities and Exploits

DEFCONConference via YouTube Direct link

Full System Emulation

9 of 13

9 of 13

Full System Emulation

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Hacking Power Management in Data Centers - Security Vulnerabilities and Exploits

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 What is a Data Center?
  3. 3 Why Data Centers?
  4. 4 Database Initialization
  5. 5 Authentication Bypass #1 (cont.)
  6. 6 Authentication Bypass #2
  7. 7 Remote Code Execution
  8. 8 Dataprobe iBoot PDU
  9. 9 Full System Emulation
  10. 10 Authentication & "Autologin"
  11. 11 The Payload
  12. 12 Triaging Command Injection Opportunities
  13. 13 Final Take-aways

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.