Completed
Intro
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Hitting the Gym - The Anatomy of a Killer Workout
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Fitness & Wellness Equipment
- 3 Smart Fitness Equipment Features
- 4 Information Security Attack Surface
- 5 Technology Tradeoffs
- 6 Compliance
- 7 Cybersecurity for Smart Fitness Devices (EU)
- 8 Medical Devices & the Fitness Paradox
- 9 Cybersecurity for Smart Fitness Devices (US)
- 10 Powered Treadmill Classification (US) • Powered Treadmills
- 11 Android Controlled Devices
- 12 MDM Technologies A set of technologies used in order to achinister
- 13 Smart Fitness Device Stack
- 14 Our case
- 15 Circumventing UI Restrictions #1
- 16 Local File Manager Abuse
- 17 Installing a custom app for remote shell access
- 18 Getting remote shell access
- 19 Privilege Escalation
- 20 Getting Hardware Control
- 21 Examination of the Android IPC and Data Sharing in Hi Kit (Display board)
- 22 Controlling the Hardware through Hi Kit
- 23 When you Press a Software Button
- 24 When you Press a Hardware Button
- 25 Fingerprinting the Device Type
- 26 Identifying a logged in User
- 27 Remotely Controlling Speed and Incline
- 28 Known cases of treadmill-related accidents
- 29 Can you make it stop?
- 30 Disabling Software / Physical buttons
- 31 Physical Emergency Button of Low Kit
- 32 Messing with the Low Kit
- 33 Fitness IoT & Corporate Environments
- 34 Red Teamers Hitting the Gym
- 35 Summary of Identified Device Vulnerabilities
- 36 Attack Scenarios for Gym Environments
- 37 Conclusions