Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Understanding Authentication Bypass Vulnerabilities in Industrial VPN Gateways

DEFCONConference via YouTube

Overview

Explore a detailed security analysis of industrial VPN gateways in this 31-minute DEF CON conference talk that examines authentication bypass vulnerabilities in remote access solutions. Dive into the critical security implications of these widely-deployed systems in industrial environments and operational technology networks. Learn about various vulnerability exploitation techniques, including device rooting, hardware security module bypasses, and firmware reverse engineering. Discover how identified vulnerabilities can lead to remote access session hijacking, creating significant security risks for critical infrastructure. Gain valuable insights into the architectural weaknesses that make these gateways attractive targets for threat actors and understand the broader implications for industrial network security.

Syllabus

DEF CON 32 - Unlocking the Gates: Understanding Authentication Bypass Vulnerabilities - Vikas Khanna

Taught by

DEFCONConference

Reviews

Start your review of Understanding Authentication Bypass Vulnerabilities in Industrial VPN Gateways

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.