Overview
Syllabus
Introduction
Agenda
What is Wemo
How Wemo works
Why Wemo
Headlines
Command Injection Vulnerability
Attack Scenario
How Rules Work
Rule Updating Algorithm
Rule ID
Sequel Injection
Attach Database Syntax
OpenWRT
Command Execution
Malicious Database
NIT Script
NIT Script Execution
NIT Script Demo
Anatomy of the Attack
Takeaways
Teardown
Logging In
You Boot Console
No Dev Console
Modifying Linux File System
Modifying Flash Password
Application Process
Conclusions
The Cloud
Cordova
Changing Device Name
Java Classes
Alert Box
Second and Third Order Effects
Disclosure Timeline
Taught by
Black Hat