Главная
Study mode:
on
1
Intro
2
Past Projects
3
What's next?
4
Perfect World
5
Real World
6
Architecture and Attack Targets
7
Abstract Methodology
8
Firmware Access for Software People
9
Examples: SPI
10
Examples: UART
11
Examples: Bootloader
12
Use Vulnerability
13
Emulation Approaches
14
Firmware Emulation
15
Dos - NullPointer Dereference
16
Web Based Findings - CSRF
17
Web Based Findings - Gigaset Maxwell Basic
18
Command Injection
19
Injection Example (Shell Script)
20
How to Bypass Password?
21
Exploit to Delete Password
22
Problem!
23
Stack Based Buffer Overflow (ARM)
24
Control SPC
25
Exploit Development, Challenges
26
Device Overview
27
Vulnerability Overview
28
Recommendations for Users/Admins
29
Recommendations for Developers
30
Lessons Learned?
Description:
Explore the world of VoIP phone vulnerabilities in this 41-minute conference talk from the 44CON Information Security Conference. Dive into past projects and future prospects before examining the architecture and attack targets of VoIP systems. Learn about firmware access techniques, including SPI, UART, and bootloader examples. Discover various emulation approaches and firmware vulnerabilities, such as null pointer dereference and web-based findings. Investigate command injection techniques, password bypass methods, and stack-based buffer overflows in ARM devices. Gain insights into exploit development challenges, device overviews, and vulnerability assessments. Conclude with valuable recommendations for users, administrators, and developers, as well as key lessons learned in VoIP security.

Dial V for Vulnerable - Attacking VoIP Phones

44CON Information Security Conference
Add to list
0:00 / 0:00