Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the security vulnerabilities of fax machines in this 45-minute conference talk from Hack.lu 2018. Delve into the history of fax technology and its surprising persistence in modern times. Examine the security implications of fax usage and learn about potential attack vectors. Follow along as the speakers demonstrate debugging techniques for hardware and software components. Discover the intricacies of JPEG compression and its role in exploiting fax vulnerabilities. Analyze real-world examples, including CVE-2018-5924 and CVE-2018-5925, and understand mitigation bypass techniques. Gain valuable insights into the unexpected security risks posed by this seemingly outdated technology and consider the broader implications for network security.
Syllabus
Intro
FAXHistory
Back To The Future
The Security View
FAXAttack
How can we Debug it?
Breaking HW
Sections
WhatISThis?!
Let's Take A Look
APattern?!
DifferentAngle
The MissingLink
Softdisk
TheUndebuggable
Lucky Break
Debugging Challenges
Scout
Vulnerability
JPEG
Mitigation Bypass
CVE-2018-5924 CVE-2018-5925
Conclusions
Taught by
Cooper