Overview
Explore the vulnerabilities and security risks associated with Internet of Things (IoT) devices in this eye-opening 43-minute Black Hat conference talk. Delve into the potential dangers of popular smart home devices, including Philips Hue lighting systems, baby monitors, WiFi cameras, and even Tesla vehicles. Learn about the methods hackers can use to exploit these devices, from finding and manipulating bridges to unauthorized monitoring and control. Discover the implications of flat networks, the future of malware, and the importance of proper security measures in IoT ecosystems. Gain insights into real-world examples, including high-profile cases involving public figures, and understand the steps taken by manufacturers to address these issues. Equip yourself with knowledge to better protect your connected devices and understand the evolving landscape of IoT security.
Syllabus
Intro
Why is this important
Devices
Hue
Bridge
Finding the Bridge
Post Requests
Username
Demo
Contacting Philips
IFTTT
The Future of Malware
The Baby Monitor
Unwelcome Monitoring
Belkin Baby Monitor
Script
Flat networks
WiFi camera
Comcast
Tesla
Chris Christie
Tesla Support
Tesla SDK
Tesla Glass
Key Fob
Ethernet Jack
Tesla Vulnerability
Conclusion
Taught by
Black Hat