Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

DEF CON 25 - Mikhail Sosonkin - Hacking travel routers like it's 1999

Автор: DEFCONConference

Загружено: 2017-11-02

Просмотров: 10569

Описание:

Digital nomads are a growing community and they need internet safety just like anyone else. Trusted security researchers have warned about the dangers of traveling through AirBnB’s. Heeding their advice, I purchased a HooToo TM06 travel router to create my own little enclave while I bounce the globe. Being a researcher myself, I did some double checking.

So, I started fuzzing and reverse engineering. While the TM06 is a cute and versatile little device - protection against network threats, it is not. In this talk, I will take you on my journey revealing my methodology for discovering and exploiting two memory corruption vulnerabilities. The vulnerabilities are severe and while they’ve been reported to the vendor, they are very revealing data points about the security state of such devices. While the device employs some exploitation mitigations, there are many missing. I will be showing how I was able to bypass them and what mitigations should’ve been employed, such as NX-Stack/Heap, canaries, etc, to prevent me from gaining arbitrary shellcode execution.

If you’re interested in security of embedded/IoT systems, travel routers or just good old fashioned MIPS hacking, then this talk is for you!

DEF CON 25 - Mikhail Sosonkin - Hacking travel routers like it's 1999

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

DEF CON 32 - Hacking Millions of Modems and Investigating Who Hacked My Modem - Sam Curry

DEF CON 32 - Hacking Millions of Modems and Investigating Who Hacked My Modem - Sam Curry

DEF CON 25 - Nick Cano - XenoScan  Scanning Memory Like a Boss

DEF CON 25 - Nick Cano - XenoScan Scanning Memory Like a Boss

Broadpwn: Remotely Compromising Android and iOS via a Bug in Broadcom's Wi-Fi Chipsets

Broadpwn: Remotely Compromising Android and iOS via a Bug in Broadcom's Wi-Fi Chipsets

DEF CON 25 SE Village - Chris Hadnagy - SE vs Predator: Using SE In Ways I Never Thought

DEF CON 25 SE Village - Chris Hadnagy - SE vs Predator: Using SE In Ways I Never Thought

DEF CON 25 - Christopher Domas - Breaking the x86 Instruction Set

DEF CON 25 - Christopher Domas - Breaking the x86 Instruction Set

Watch these hackers crack an ATM in seconds

Watch these hackers crack an ATM in seconds

Правительство США запретит устройства TP-Link: взлом китайского Wi-Fi-роутера в режиме реального ...

Правительство США запретит устройства TP-Link: взлом китайского Wi-Fi-роутера в режиме реального ...

DEF CON 25 - Matt Knight - Radio Exploitation 101

DEF CON 25 - Matt Knight - Radio Exploitation 101

Cracking the Lens: Targeting HTTP's Hidden Attack-Surface

Cracking the Lens: Targeting HTTP's Hidden Attack-Surface

Defcon 21 - The Secret Life of SIM Cards

Defcon 21 - The Secret Life of SIM Cards

DEF CON 25 ICS Village - Joe Weiss - Cyber Security Issues with Level 0 through 1 Devices

DEF CON 25 ICS Village - Joe Weiss - Cyber Security Issues with Level 0 through 1 Devices

DEF CON 29 - Roy Davis - No Key  No PIN  No Combo  No Problem Pwning ATMs For Fun and Profit

DEF CON 29 - Roy Davis - No Key No PIN No Combo No Problem Pwning ATMs For Fun and Profit

РОУТЕР С VPN за 1200₽ | OpenWRT + Podkop + Amnezia | Полный Гайд на Xiaomi 4С

РОУТЕР С VPN за 1200₽ | OpenWRT + Podkop + Amnezia | Полный Гайд на Xiaomi 4С

Извлечение прошивки китайской IP-камеры — основы пентестинга в Интернете вещей

Извлечение прошивки китайской IP-камеры — основы пентестинга в Интернете вещей

Структура файлов и каталогов в Linux

Структура файлов и каталогов в Linux

DEF CON 25 - Mark Williams, Rob Stanley - If You Give a Mouse a Microchip

DEF CON 25 - Mark Williams, Rob Stanley - If You Give a Mouse a Microchip

DEF CON 25 - Jim Nitterauer - DNS: Devious Name Services Destroying Privacy & Anonymity w/o consent

DEF CON 25 - Jim Nitterauer - DNS: Devious Name Services Destroying Privacy & Anonymity w/o consent

DEF CON 25 - Konstantinos Karagiannis - Hacking Smart Contracts

DEF CON 25 - Konstantinos Karagiannis - Hacking Smart Contracts

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

Как хакеры взламывают Google 2FA

Как хакеры взламывают Google 2FA

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]