Overview
Syllabus
The Internet Of Insecure Things: 10 Most Wanted List
Things About Paul
Things About This Presentation
Its More About...
Embedded Systems
Consumer
People cared when...
Care more now?
Why Do We Care? Privacy.
Things are real
Industrial Control Systems
Corporate
Medical
More Already Happening
If I Had To Pick One Example....
Inside Joel's Backdoor
Background
Exemplify Problem Areas
Why Joel Did This?
Russians Found It First
Exploit Is Simple
Canadians & Chinese
Remote Exploitation Via Browser
DIR-100 Butter Overflow
Multi-Stage Dropper MIPS Shellcode
Let's Recap
Owning D-Link?
What Do We Do About It?
Firmware Backdoors
Backdoor password was...
Default Credentials
Insecure Remote Management
Open-Source drivers
Functions prone to overflow
Funny Thing About Encryption
Firmware Encryption
User Friendly Firmware Updates
Secure Web Frameworks
Maintain a CIRT
Secure Protocols