I Own Your Building - Management System

I Own Your Building - Management System

Hack In The Box Security Conference via YouTube Direct link

Example: rootstyle

19 of 28

19 of 28

Example: rootstyle

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

I Own Your Building - Management System

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 What is a BMS?
  3. 3 BMS for end users
  4. 4 What Does a BMS Do?
  5. 5 Building Control Applications
  6. 6 Typical Systems Components - Field Devices
  7. 7 Typical Systems Components - Networks
  8. 8 Interaction With Other Building Management Systems
  9. 9 Typical User Interface Options
  10. 10 BMS Simple User Interfaces - Web Interface
  11. 11 BMS & EDAC
  12. 12 Advertisement - 2019
  13. 13 Security Analysis and Exploitation
  14. 14 Exposure of Management Interface
  15. 15 Software Technology in Controllers
  16. 16 Automatic and Manual Vulnerability Discovery
  17. 17 Obtaining Firmware
  18. 18 Example: Cookie traversal
  19. 19 Example: rootstyle
  20. 20 Backdoors (Development Console)
  21. 21 Example: Java backdoor
  22. 22 Backdoor Access - Optergy
  23. 23 System Access - Linear e Merge E3-Series
  24. 24 System Access - Metasploit Session
  25. 25 System Access - Prima FlexAir #2
  26. 26 Impact
  27. 27 Potential targets (case studies from the vendor)
  28. 28 Upgrade

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.