The Internet of Insecure Things - 10 Most Wanted List

The Internet of Insecure Things - 10 Most Wanted List

via YouTube Direct link

Remote Exploitation Via Browser

23 of 40

23 of 40

Remote Exploitation Via Browser

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

The Internet of Insecure Things - 10 Most Wanted List

Automatically move to the next video in the Classroom when playback concludes

  1. 1 The Internet Of Insecure Things: 10 Most Wanted List
  2. 2 Things About Paul
  3. 3 Things About This Presentation
  4. 4 Its More About...
  5. 5 Embedded Systems
  6. 6 Consumer
  7. 7 People cared when...
  8. 8 Care more now?
  9. 9 Why Do We Care? Privacy.
  10. 10 Things are real
  11. 11 Industrial Control Systems
  12. 12 Corporate
  13. 13 Medical
  14. 14 More Already Happening
  15. 15 If I Had To Pick One Example....
  16. 16 Inside Joel's Backdoor
  17. 17 Background
  18. 18 Exemplify Problem Areas
  19. 19 Why Joel Did This?
  20. 20 Russians Found It First
  21. 21 Exploit Is Simple
  22. 22 Canadians & Chinese
  23. 23 Remote Exploitation Via Browser
  24. 24 DIR-100 Butter Overflow
  25. 25 Multi-Stage Dropper MIPS Shellcode
  26. 26 Let's Recap
  27. 27 Owning D-Link?
  28. 28 What Do We Do About It?
  29. 29 Firmware Backdoors
  30. 30 Backdoor password was...
  31. 31 Default Credentials
  32. 32 Insecure Remote Management
  33. 33 Open-Source drivers
  34. 34 Functions prone to overflow
  35. 35 Funny Thing About Encryption
  36. 36 Firmware Encryption
  37. 37 User Friendly Firmware Updates
  38. 38 Secure Web Frameworks
  39. 39 Maintain a CIRT
  40. 40 Secure Protocols

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.