Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Exploiting Security Vulnerabilities in Microhard Radio Equipment

DEFCONConference via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore critical security vulnerabilities in Microhard's long-range radio equipment through this 18-minute conference talk from DEF CON 32. Discover how the Canadian company's products, widely used in SCADA environments, point-of-sale terminals, and power utilities, contain significant security flaws including command injections and buffer overflows. Learn about the company's practice of obscuring vulnerability fixes behind vague release notes, and understand the broader implications for secure development processes in industrial communication equipment. Gain valuable insights into the security challenges facing critical infrastructure components and the importance of transparent security practices in industrial systems.

Syllabus

DEF CON 32 - MicroHard More Like MicroEasy to Exploit - Ricky Lawshae

Taught by

DEFCONConference

Reviews

Start your review of Exploiting Security Vulnerabilities in Microhard Radio Equipment

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.