Completed
Exploit Is Simple
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The Internet of Insecure Things - 10 Most Wanted List
Automatically move to the next video in the Classroom when playback concludes
- 1 The Internet Of Insecure Things: 10 Most Wanted List
- 2 Things About Paul
- 3 Things About This Presentation
- 4 Its More About...
- 5 Embedded Systems
- 6 Consumer
- 7 People cared when...
- 8 Care more now?
- 9 Why Do We Care? Privacy.
- 10 Things are real
- 11 Industrial Control Systems
- 12 Corporate
- 13 Medical
- 14 More Already Happening
- 15 If I Had To Pick One Example....
- 16 Inside Joel's Backdoor
- 17 Background
- 18 Exemplify Problem Areas
- 19 Why Joel Did This?
- 20 Russians Found It First
- 21 Exploit Is Simple
- 22 Canadians & Chinese
- 23 Remote Exploitation Via Browser
- 24 DIR-100 Butter Overflow
- 25 Multi-Stage Dropper MIPS Shellcode
- 26 Let's Recap
- 27 Owning D-Link?
- 28 What Do We Do About It?
- 29 Firmware Backdoors
- 30 Backdoor password was...
- 31 Default Credentials
- 32 Insecure Remote Management
- 33 Open-Source drivers
- 34 Functions prone to overflow
- 35 Funny Thing About Encryption
- 36 Firmware Encryption
- 37 User Friendly Firmware Updates
- 38 Secure Web Frameworks
- 39 Maintain a CIRT
- 40 Secure Protocols