Overview
Explore a detailed security analysis of industrial VPN gateways in this 31-minute DEF CON conference talk that examines authentication bypass vulnerabilities in remote access solutions. Dive into the critical security implications of these widely-deployed systems in industrial environments and operational technology networks. Learn about various vulnerability exploitation techniques, including device rooting, hardware security module bypasses, and firmware reverse engineering. Discover how identified vulnerabilities can lead to remote access session hijacking, creating significant security risks for critical infrastructure. Gain valuable insights into the architectural weaknesses that make these gateways attractive targets for threat actors and understand the broader implications for industrial network security.
Syllabus
DEF CON 32 - Unlocking the Gates: Understanding Authentication Bypass Vulnerabilities - Vikas Khanna
Taught by
DEFCONConference