Completed
Black Hat Sound Bytes
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Subverting Satellite Receivers for Botnet and Profit
Automatically move to the next video in the Classroom when playback concludes
- 1 Subverting satellite receivers for botnet and profit
- 2 The quest for the Control Word
- 3 Scrambling
- 4 What made the difference ?
- 5 Attack evolution
- 6 Card sharing concept
- 7 Components and Actors
- 8 Teardown of an STB
- 9 Better than my graduation computer
- 10 Are they vulnerable ?
- 11 Remotely exploitable ?
- 12 What could possibly go wrong?
- 13 How does it work
- 14 The weakest link of the chain
- 15 What's wrong with that?
- 16 Overview
- 17 Basic steps to build the botnet
- 18 What will be the result ?
- 19 Did this happen before?
- 20 Challenges to mitigate that
- 21 Black Hat Sound Bytes