Completed
What's next?
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Dial V for Vulnerable - Attacking VoIP Phones
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Past Projects
- 3 What's next?
- 4 Perfect World
- 5 Real World
- 6 Architecture and Attack Targets
- 7 Abstract Methodology
- 8 Firmware Access for Software People
- 9 Examples: SPI
- 10 Examples: UART
- 11 Examples: Bootloader
- 12 Use Vulnerability
- 13 Emulation Approaches
- 14 Firmware Emulation
- 15 Dos - NullPointer Dereference
- 16 Web Based Findings - CSRF
- 17 Web Based Findings - Gigaset Maxwell Basic
- 18 Command Injection
- 19 Injection Example (Shell Script)
- 20 How to Bypass Password?
- 21 Exploit to Delete Password
- 22 Problem!
- 23 Stack Based Buffer Overflow (ARM)
- 24 Control SPC
- 25 Exploit Development, Challenges
- 26 Device Overview
- 27 Vulnerability Overview
- 28 Recommendations for Users/Admins
- 29 Recommendations for Developers
- 30 Lessons Learned?