Главная
Study mode:
on
1
The Internet Of Insecure Things: 10 Most Wanted List
2
Things About Paul
3
Things About This Presentation
4
Its More About...
5
Embedded Systems
6
Consumer
7
People cared when...
8
Care more now?
9
Why Do We Care? Privacy.
10
Things are real
11
Industrial Control Systems
12
Corporate
13
Medical
14
More Already Happening
15
If I Had To Pick One Example....
16
Inside Joel's Backdoor
17
Background
18
Exemplify Problem Areas
19
Why Joel Did This?
20
Russians Found It First
21
Exploit Is Simple
22
Canadians & Chinese
23
Remote Exploitation Via Browser
24
DIR-100 Butter Overflow
25
Multi-Stage Dropper MIPS Shellcode
26
Let's Recap
27
Owning D-Link?
28
What Do We Do About It?
29
Firmware Backdoors
30
Backdoor password was...
31
Default Credentials
32
Insecure Remote Management
33
Open-Source drivers
34
Functions prone to overflow
35
Funny Thing About Encryption
36
Firmware Encryption
37
User Friendly Firmware Updates
38
Secure Web Frameworks
39
Maintain a CIRT
40
Secure Protocols
Description:
Explore the top 10 security vulnerabilities in Internet of Things (IoT) devices in this comprehensive conference talk. Delve into the world of embedded systems, consumer products, industrial control systems, corporate networks, and medical devices to understand the growing importance of IoT security. Learn about real-world examples, including the infamous D-Link router backdoor, and discover how simple exploits can lead to remote code execution. Gain insights into common issues such as default credentials, insecure remote management, and firmware vulnerabilities. Examine the challenges of encryption in IoT devices and the importance of secure protocols. Understand the need for user-friendly firmware updates, secure web frameworks, and maintaining a CIRT (Computer Incident Response Team) to address these critical security concerns in the rapidly expanding IoT landscape.

The Internet of Insecure Things - 10 Most Wanted List

Add to list
0:00 / 0:00