Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore critical security vulnerabilities in Microhard's long-range radio equipment through this 18-minute conference talk from DEF CON 32. Discover how the Canadian company's products, widely used in SCADA environments, point-of-sale terminals, and power utilities, contain significant security flaws including command injections and buffer overflows. Learn about the company's practice of obscuring vulnerability fixes behind vague release notes, and understand the broader implications for secure development processes in industrial communication equipment. Gain valuable insights into the security challenges facing critical infrastructure components and the importance of transparent security practices in industrial systems.
Syllabus
DEF CON 32 - MicroHard More Like MicroEasy to Exploit - Ricky Lawshae
Taught by
DEFCONConference