We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

IoT Village - Kicking Devices, Taking CVEs

00:00

Formal Metadata

Title
IoT Village - Kicking Devices, Taking CVEs
Subtitle
Zoomer Guide to Hacking
Title of Series
Number of Parts
374
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Do you ever play iSpy with the smart devices around you and wonder how easy it is to hack shit and get CVEs? In the Zoomer era, smart devices are extremely accessible, generally cheap and not very security focused. In this talk, Sarda (a fellow Zoomer) will walk the audience through the basic methodology, tooling, exploitation, and disclosure process used when hacking an IoT device. This talk will include a “livish” demo of the exploitation of 5 CVEs, including remote code execution and telnet access, discovered while researching the Tenda AC1900 router—which can be chained to provide persistent root shell access to the device
MereologyAsynchronous Transfer ModeScripting languageInformationWeb browserGroup actionDirected setEinheitswurzelPasswordGastropod shellSource codeTelnetDemonSoftware testingTelecommunicationElectronic program guideHacker (term)Computer networkMetropolitan area networkInformation securityProcess (computing)State of matterWeb browserSoftwareUsabilityGroup actionCartesian coordinate systemMultiplication signBlock (periodic table)MotherboardPoint (geometry)AreaFrequencyInformationPhysical systemRow (database)Game controllerSystem callComputer hardwareMathematical analysisPasswordTrailVulnerability (computing)SurfaceField (computer science)Different (Kate Ryan album)Special unitary groupHacker (term)FamilyRouter (computing)TheoryInstance (computer science)Lattice (order)Video gameMachine visionGraph coloringPrisoner's dilemmaIdentity managementInjektivitätDemoscene1 (number)Annihilator (ring theory)Online helpComputer configurationPlanningArithmetic meanData managementFigurate numberTraffic reportingShared memorySensitivity analysisPower (physics)Electronic mailing listHand fanForm (programming)Escape characterOraclePresentation of a groupPlastikkarteFirmwarePivot elementSource codeInternet der DingeMereologyRemote procedure callAuthorizationCross-site scriptingScripting languageTelecommunicationSuite (music)RootGastropod shellUser interfaceDemonIdentifiabilityDirection (geometry)TelnetEmailMusical ensembleRevision controlDuality (mathematics)Open setSinc functionCoefficient of determinationWeb 2.0CodeWeb applicationSoftware testingCAN busElectronic program guideForcing (mathematics)AuthenticationFlow separationComputer animation
FirmwareAsynchronous Transfer ModeCodeParsingString (computer science)Zoom lensElectronic program guideHacker (term)MereologyNon-standard analysisSimulationHash functionGroup actionPasswordRight angleWordIncidence algebraChemical equationRevision controlInstance (computer science)Key (cryptography)AuthenticationPoint (geometry)Pattern languageMereologyMedical imagingClassical physicsWave packetMetropolitan area networkBinary fileFunctional (mathematics)Cellular automatonArmState of matterPower (physics)Computer fileMultiplication signString (computer science)Annulus (mathematics)ChainOperator (mathematics)Digital photographySoftwarePhysical systemGoodness of fitFlow separationTelnetScripting languageBinary codePhase transitionCross-site scriptingCodeUser interfaceDenial-of-service attackBootingElectronic visual displayWeb 2.0Function (mathematics)FirmwareRouter (computing)Social engineering (security)Gastropod shellRemote procedure callLoginToken ringRootSource codeParsingVulnerability (computing)Ripping2 (number)Computer wormFigurate number
Asynchronous Transfer ModeHacker (term)Electronic program guideState of matterExistenceComputer fileRouter (computing)CausalityCrash (computing)FamilyRight angleSource codeComputer animation
Asynchronous Transfer ModeMaxima and minimaHacker (term)Electronic program guideZoom lensComputer fileMultiplication signDemo (music)Data storage deviceVideo game consolePattern languageFlash memoryContent (media)Partition (number theory)Charge carrierSystem administratorBackupSemiconductor memoryFunctional (mathematics)CASE <Informatik>PasswordFamilyMaizeGreen's functionHash functionRoundness (object)Similarity (geometry)MetreCoordinate systemWater vaporCue sportsFood energyPhysical systemInformationHacker (term)Group actionBlock (periodic table)Parameter (computer programming)Figurate numberBitSet (mathematics)Router (computing)Computer hardwareSoftwareFunction (mathematics)TelnetComputer animation
Hacker (term)Electronic program guideAsynchronous Transfer ModeZoom lensComputer-generated imageryGamma functionDemo (music)Boom (sailing)Router (computing)Dimensional analysisConnected spacePhysical systemReverse engineeringScripting languageCASE <Informatik>Revision controlTelnetGastropod shellComputer fileStapeldateiCuboidType theoryAddress spaceVideo gameFirmwareElectronic mailing listBitSoftware testingNormal (geometry)Exploit (computer security)PasswordRight angleWeightBuildingGroup actionPhysical lawAdditionFamilyProduct (business)Disk read-and-write headMereologyAreaPlanningGame theoryEinheitswurzelActive contour modelRow (database)Machine visionLine (geometry)InternetworkingForcing (mathematics)PlastikkarteFreewareComputer animation
Hacker (term)Asynchronous Transfer ModeDemosceneMereologyDependent and independent variablesFreewareCodeSlide ruleBlogFirmwareSuite (music)Link (knot theory)Electronic program guide2 (number)CodeEmailVulnerability (computing)Presentation of a groupDependent and independent variablesRevision controlMereologyFirmwareSlide ruleLink (knot theory)QR codeGroup actionWebsiteExploit (computer security)Proof theoryBlogSystem callProcess (computing)Demo (music)Suite (music)InformationDebuggerArmUsabilityPlanningFactory (trading post)Coma BerenicesDreizehnService (economics)DataflowFrequencyGastropod shellElectronic program guideComputer animation
Transcript: English(auto-generated)