Главная
Study mode:
on
1
Intro
2
Why am I talking about video interfaces?
3
HDMI is an output isn't it?
4
Supported CEC commands
5
The CEC protocol
6
Can we fuzz CEC?
7
What are the fuzzer results?
8
HEC - HDMI Ethernet Channel
9
CDC (Capability Discovery and Control)
10
Network loop prevention
11
Queue control
12
Endpoint Protection Circumvent
13
Unauthorised Network Extensio
14
Testing HDMI Ethernet Channel
15
Another corporate HDMI security risk
Description:
Explore the security implications of HDMI Ethernet Channel and related protocols in this 49-minute conference talk from 44CON Information Security Conference. Delve into the evolution from VGA to HDMI and the additional capabilities this transition brings. Examine the EDID protocol's security, which enables displays to communicate with hosts via HDMI and VGA interfaces. Investigate the Consumer Electronics Control (CEC) and HDMI Ethernet Channel (HEC) protocols, discussing their impact on consumer network security and corporate environments. Learn about CECSTeR, a CEC security testing tool, and its applications. Analyze supported CEC commands, protocol details, and fuzzing techniques. Explore HEC's features, including Capability Discovery and Control (CDC), network loop prevention, and queue control. Uncover potential security risks such as endpoint protection circumvention and unauthorized network extension. Gain insights into testing methodologies for HDMI Ethernet Channel and other corporate HDMI security concerns. Read more

What the HEC - Security Implications of HDMI Ethernet Channel and Other Related Protocols

44CON Information Security Conference
Add to list
0:00 / 0:00