Главная
Study mode:
on
1
Intro
2
What is a Smart Gateway
3
Why integrate a Smart Gateway
4
How easy is it to remove someone
5
Which devices were tested
6
Technical Analysis
7
SG150
8
First two vulnerabilities
9
Live demo
10
Third vulnerability
11
Second vulnerability
12
First vulnerability
13
Read access
14
Command Injection
15
Lessons Learned
16
Questions
Description:
Explore the vulnerabilities of cloudless smart door systems in this 53-minute conference talk from the Hack In The Box Security Conference. Dive into the complexities of intercom networks in large buildings, including call buttons, access control units, and IP gateways. Learn about typical scenarios where intercom systems interface with IP networks, focusing on two devices designed for larger installations without cloud dependence. Discover the security implications of these systems through technical analysis and live demonstrations. Gain insights from security researchers Sebastian Neef, Julian Beier, and Lars Burhop as they discuss vulnerabilities found in the SG150 device, including command injection and unauthorized read access. Understand the lessons learned from this research and its implications for enterprise and security-conscious users.

The Insecurity of Cloudless Smart Door Systems

Hack In The Box Security Conference
Add to list
0:00 / 0:00