Dial V for Vulnerable - Attacking VoIP Phones

Dial V for Vulnerable - Attacking VoIP Phones

44CON Information Security Conference via YouTube Direct link

Perfect World

4 of 30

4 of 30

Perfect World

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Dial V for Vulnerable - Attacking VoIP Phones

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Past Projects
  3. 3 What's next?
  4. 4 Perfect World
  5. 5 Real World
  6. 6 Architecture and Attack Targets
  7. 7 Abstract Methodology
  8. 8 Firmware Access for Software People
  9. 9 Examples: SPI
  10. 10 Examples: UART
  11. 11 Examples: Bootloader
  12. 12 Use Vulnerability
  13. 13 Emulation Approaches
  14. 14 Firmware Emulation
  15. 15 Dos - NullPointer Dereference
  16. 16 Web Based Findings - CSRF
  17. 17 Web Based Findings - Gigaset Maxwell Basic
  18. 18 Command Injection
  19. 19 Injection Example (Shell Script)
  20. 20 How to Bypass Password?
  21. 21 Exploit to Delete Password
  22. 22 Problem!
  23. 23 Stack Based Buffer Overflow (ARM)
  24. 24 Control SPC
  25. 25 Exploit Development, Challenges
  26. 26 Device Overview
  27. 27 Vulnerability Overview
  28. 28 Recommendations for Users/Admins
  29. 29 Recommendations for Developers
  30. 30 Lessons Learned?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.