Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the vulnerabilities of modern satellite receivers and their potential for exploitation in this eye-opening Black Hat conference talk. Delve into the world of embedded Linux-based Set Top Boxes, examining how their advanced features and connectivity options have inadvertently opened doors for hackers to crack DVB-CA encryption schemes. Learn about a practical attack that exploits human weaknesses, design flaws, and subscription mechanisms relying on custom plugins for channel decryption. Discover the technical details of a similar attack conducted using a backdoor within the CCCAM protocol provider. Understand the potential for building massive botnets using compromised satellite receivers and computers, which could lead to further network intrusions and cyber attacks. Gain insights into the challenges of mitigating these threats, given the millions of unaware users seeking cheap or free satellite television. Through a comprehensive syllabus, uncover the evolution of attacks, card sharing concepts, and the components involved in subverting these devices for malicious purposes.
Syllabus
Subverting satellite receivers for botnet and profit
The quest for the Control Word
Scrambling
What made the difference ?
Attack evolution
Card sharing concept
Components and Actors
Teardown of an STB
Better than my graduation computer
Are they vulnerable ?
Remotely exploitable ?
What could possibly go wrong?
How does it work
The weakest link of the chain
What's wrong with that?
Overview
Basic steps to build the botnet
What will be the result ?
Did this happen before?
Challenges to mitigate that
Black Hat Sound Bytes
Taught by
Black Hat