Главная
Study mode:
on
1
Introduction
2
Agenda
3
What is Wemo
4
How Wemo works
5
Why Wemo
6
Headlines
7
Command Injection Vulnerability
8
Attack Scenario
9
How Rules Work
10
Rule Updating Algorithm
11
Rule ID
12
Sequel Injection
13
Attach Database Syntax
14
OpenWRT
15
Command Execution
16
Malicious Database
17
NIT Script
18
NIT Script Execution
19
NIT Script Demo
20
Anatomy of the Attack
21
Takeaways
22
Teardown
23
Logging In
24
You Boot Console
25
No Dev Console
26
Modifying Linux File System
27
Modifying Flash Password
28
Application Process
29
Conclusions
30
The Cloud
31
Cordova
32
Changing Device Name
33
Java Classes
34
Alert Box
35
Second and Third Order Effects
36
Disclosure Timeline
Description:
Explore a comprehensive analysis of vulnerabilities in Belkin's WeMo home automation devices in this Black Hat conference talk. Delve into multiple security flaws discovered in both the devices and the Android app, including methods to obtain root shell access, execute arbitrary code on paired phones, and launch denial-of-service attacks. Learn about the intricacies of WeMo's functionality, command injection vulnerabilities, and the rule updating algorithm. Examine attack scenarios, sequel injection techniques, and the process of exploiting OpenWRT for command execution. Gain insights into malicious database creation, NIT script execution, and the anatomy of various attacks. Investigate methods for modifying Linux file systems, changing device names, and exploiting Java classes in the Android app. Understand the potential second and third-order effects of these vulnerabilities and review the disclosure timeline. This talk provides valuable information for security professionals and IoT enthusiasts interested in the complexities of securing smart home devices. Read more

Breaking BHAD - Abusing Belkin Home Automation Devices

Black Hat
Add to list
0:00 / 0:00