We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Let's talk about SOAP, baby. Let's talk about UPnP.

00:00

Formal Metadata

Title
Let's talk about SOAP, baby. Let's talk about UPnP.
Title of Series
Number of Parts
109
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Whether we want it to be or not, the Internet of Things is upon us. Network interfaces are the racing stripes of today's consumer device market. And if you put a network interface on a device, you have to make it do something right? That's where a Simple Object Access Protocol (SOAP) service comes in. SOAP services are designed with ease-of-access in mind, many times at the expense of security. Ludicrous amounts of control over device functionality, just about every category of vulnerability you can think of, and an all-around lack of good security practice about sums it up. In this talk, I will discuss this growing attack surface, demonstrate different methods for attacking/fuzzing it, and provide plenty of examples of the many dangers of insecure SOAP/ UPnP interfaces on embedded and "smart" devices along the way. Speaker Bio: Ricky "HeadlessZeke" Lawshae is a Security Researcher for DVLabs at HP TippingPoint with a medium-sized number of years' experience in professionally voiding warranties. He has spoken at the DEF CON, Recon, Insomni'hack, and Ruxcon security conferences, and is an active participant in the extensive Austin, TX hacker community. In his meager spare time, he enjoys picking locks, reading comic books, and drinking expensive beers. Twitter: @HeadlessZeke
Mathematical singularityLie groupCuboidMetropolitan area networkFerry CorstenMultiplication signInformation securityRight angleOpen setComputer animation
Hecke operatorPole (complex analysis)Point (geometry)Information securityInformationAliasingInformation securityPoint (geometry)Multiplication signProcess (computing)Letterpress printingBitCountingInternet der Dinge
Service (economics)Smart DevicePasswordReal numberConnected spaceAuthenticationInternetworkingComputer networkWeb serviceCommunications protocolInternet der DingeService (economics)Interface (computing)Multiplication signTerm (mathematics)Goodness of fitMereologyArithmetic mean
Computer networkIP addressGame controllerDisk read-and-write headGroup actionMereologyTouchscreenCommunications protocolSlide ruleData managementType theoryPresentation of a groupWeb 2.0Dependent and independent variablesEvent horizonUniform resource locatorTerm (mathematics)EmailDescriptive statisticsPoint (geometry)BitMoment (mathematics)
Revision controlInformationEmailDescriptive statisticsUniform resource locatorComputer networkInformationRevision control
Revision controlInformationGroup actionVariable (mathematics)Computer-generated imageryMulti-agent systemService-oriented architectureControl flowService (economics)Group actionConnected spaceParameter (computer programming)Default (computer science)String (computer science)Set (mathematics)Type theoryGame controllerDescriptive statisticsGastropod shellDampingQuicksortUniform resource locatorSystem callScripting languageInformationComputer-generated imageryDebuggerData typeSlide ruleWeb serviceElectronic mailing listError messageGreatest elementRevision controlField (computer science)Front and back endsRouter (computing)Event horizonFunction (mathematics)Block (periodic table)outputFlowchart
Computer networkSupersymmetrySystem programmingColor managementGame controllerLengthTouchscreenMotion captureFörderverein International Co-Operative StudiesComputer wormPhysical systemBitPhysicalismVideoconferencing
Message passingMessage passingRight angle
Information securityBinary fileNP-hardComputer hardwareDifferent (Kate Ryan album)Software developerWhiteboardSemiconductor memoryInternet der DingeSpacetimeSoftware bugExploit (computer security)Flow separationLimit (category theory)StatisticsParsingSlide ruleSurfaceInformation securityMultiplication signFirmwareInternetworkingSoftwareCodeRight angle
SurfaceHost Identity ProtocolService-oriented architectureEmailComplex (psychology)SurfaceParsingCommunications protocolThermal expansionData flow diagramInjektivitätStack (abstract data type)Standard deviation
SurfaceLink (knot theory)Data typeWide area networkFile formatPhysical systemGastropod shellGastropod shellService (economics)File formatVulnerability (computing)Type theoryGroup actionConnected spaceSet (mathematics)Series (mathematics)InjektivitätMedical imagingLipschitz-StetigkeitBuffer solutionCodeFilm editingoutputComputer wormParameter (computer programming)Link (knot theory)EmailDependent and independent variablesContent (media)Ferry CorstenString (computer science)Multiplication signComputer networkSurfaceNumberValidity (statistics)Scripting languageComputer fileBlogData flow diagramBuffer overflowSign (mathematics)TheoryPrinciple of maximum entropyInsertion lossCuboidComa BerenicesDemo (music)
Demo (music)VorwärtsfehlerkorrekturVulnerability (computing)Point (geometry)Client (computing)Router (computing)MappingFirewall (computing)Group actionNeuroinformatikTraffic reportingInjektivitätGame theoryProjective planeMathematicsLibrary (computing)Revision controlGateway (telecommunications)Software frameworkFirmwareDemo (music)Real numberMultiplicationOnline helpMereologyLipschitz-StetigkeitParsingComputer networkExploit (computer security)Computer networkTwitterWritingProcess (computing)
Gastropod shellProcess (computing)Exploit (computer security)Computer wormComputer file
Level (video gaming)Router (computing)RoutingInjektivitätDemo (music)Greatest elementProcess (computing)Root
Uniform resource locatorComputer networkSet (mathematics)Group actionGame controllerHypermediaComputer fileShared memoryScripting language
Scripting languageMoving averageVideoconferencingSet (mathematics)Blu-ray DiscComputer networkTopological vector spaceSource codeComputer animation
MathematicsComputer networkLaptopHypermediaShared memoryComputer animationLecture/Conference
Demo (music)Data storage deviceTelecommunicationInteractive televisionGame controllerCodecVideoconferencingSoftware bugComputer animation
Service (economics)Computer networkInterface (computing)WordPoint (geometry)Computer networkComputer animation
Interior (topology)Computer networkElectronic program guideRothe-VerfahrenComputer networkService (economics)Binary fileComputer configurationProjective planeRouter (computing)Video gameDefault (computer science)LaptopWeb serviceMessage passingPower (physics)WindowLipschitz-StetigkeitTelecommunicationBeta functionVulnerability (computing)
Meta elementLine (geometry)Disk read-and-write headLecture/Conference
Transcript: English(auto-generated)