Главная
Study mode:
on
1
Introduction
2
Who am I
3
Logitech Harmony Hub
4
The Smart Home
5
Python
6
Network Services
7
Firmware
8
Vulnerability
9
File System
10
Vulnerability Overview
11
Device Interaction
12
Command Injection
13
Origin Validation
14
Commands
15
What can you do
16
Proof of concept
Description:
Explore the process of reverse engineering Logitech's Harmony smart home hub in this 18-minute conference talk from BSidesSF 2019. Dive into vulnerability hunting techniques from a blackbox perspective, learn about the discovered vulnerabilities, and understand their post-exploitation implications. Follow along as the speaker outlines the smart home ecosystem, Python usage, network services analysis, firmware examination, and file system exploration. Gain insights into vulnerability overview, device interaction methods, command injection risks, and origin validation issues. Discover the potential commands an attacker could execute and witness a proof of concept demonstration. Whether you're a security professional or a smart home enthusiast, this talk offers valuable knowledge on the security landscape of popular smart home devices.

Owning the Smart Home with Logitech Harmony Hub

Security BSides San Francisco
Add to list
0:00 / 0:00