Главная
Study mode:
on
1
Introduction
2
Sara Barrett
3
Agenda
4
Disclaimer
5
What are connected medical devices
6
Categories of connected medical devices
7
Inhouse medical devices
8
Information loop
9
Ecosystem
10
Why connected medical devices
11
Challenges of connected medical devices
12
Serial to Ethernet converters
13
Attack surface
14
Metric
15
Financial vs Medical Data
16
Case Studies
17
Digital Pen
18
Workflow
19
Default Accounts
20
Use Case Scenario
21
Observations
22
Analysis
23
Reverse Engineering
24
Port Scan
25
Prescriptions
26
Summary
27
IV Infusion Pump
28
Pump Server
29
Lab Setup
30
Initial observations
31
Troubleshooting
32
eBay
33
Exporting Network Settings
34
More Observations
35
Initial Packet
36
Master Drug List
37
Conclusion
Description:
Explore the risks associated with connected healthcare devices in this Black Hat conference talk. Delve into the benefits and challenges of adopting IoT for medical devices, examining current exposure, common communication channels, and interconnectivity approaches with critical components. Gain insights into potential vulnerabilities through case studies of digital pens and IV infusion pumps, including workflow analysis, default account exploitation, and reverse engineering techniques. Learn about the implications of compromised medical data compared to financial information, and understand the importance of securing the healthcare IoT ecosystem. Discover practical examples of attack surfaces, troubleshooting methods, and potential security flaws in medical device networks.

Breaking Bad - Stealing Patient Data Through Medical Devices

Black Hat
Add to list
0:00 / 0:00