DCMTK: Insecure functionality xml2dcm utility allows to read local files
12
DICOM Network: Common methods
13
DICOM Network: Retrieving info
14
DICOM Network: Fuzzing
15
DCMTK: Fuzzing
16
Summary
17
DICOM: Usage statistics
Description:
Explore the world of medical imaging security in this 26-minute conference talk from the Hack In The Box Security Conference. Dive into a comprehensive security analysis of popular DICOM servers, protocols, and libraries used in medical imaging systems. Discover critical vulnerabilities in the DICOM ecosystem, learn how to identify and exploit these security flaws, and understand the importance of rapid bug fixing. Gain insights into successful strategies for uncovering weaknesses in medical imaging applications, with a focus on NVIDIA CLARA, SimpleITK, ORTHANC, DCMTK, and DICOM Network protocols. Follow along as Maria Nedyak, a developer at Bi.Zone and member of the Sibears CTF team, shares her expertise on topics such as heap buffer overflows, insecure APIs, CSRF, XXE, and fuzzing techniques specific to medical imaging systems.
How to Hack Medical Imaging Applications via DICOM