Hacking Power Management in Data Centers - Security Vulnerabilities and Exploits

Hacking Power Management in Data Centers - Security Vulnerabilities and Exploits

DEFCONConference via YouTube Direct link

Triaging Command Injection Opportunities

12 of 13

12 of 13

Triaging Command Injection Opportunities

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Hacking Power Management in Data Centers - Security Vulnerabilities and Exploits

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 What is a Data Center?
  3. 3 Why Data Centers?
  4. 4 Database Initialization
  5. 5 Authentication Bypass #1 (cont.)
  6. 6 Authentication Bypass #2
  7. 7 Remote Code Execution
  8. 8 Dataprobe iBoot PDU
  9. 9 Full System Emulation
  10. 10 Authentication & "Autologin"
  11. 11 The Payload
  12. 12 Triaging Command Injection Opportunities
  13. 13 Final Take-aways

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.