Главная
Study mode:
on
1
Intro
2
Common perception
3
Requirements
4
IoT Top 10
5
The proper venn diagram
6
March 2020
7
What is live streaming
8
Hardware encoder
9
Fixing color balance
10
Port scan
11
Firmware backup
12
Password file
13
Password hash
14
Demonstration
15
Application Security Assessment
16
Authentication
17
Backdoor
18
HTTP Request
19
Code Review
20
Find
21
Multipart data
22
File upload
23
PNG upload
24
Buffer overflow
25
RTSP
26
Denial of service
27
Showdown
28
Responsible disclosure
29
Cert Coordination Center
30
Huawei
31
Ten months later
32
Summary
Description:
Explore the intersection of AppSec and IoT security in this 45-minute conference talk by Alexei Kojenov, Lead Product Security Engineer at Salesforce. Dive into a hacking journey that begins with device configuration settings and progresses through software reverse engineering, vulnerability discovery, and the responsible disclosure of six new CVEs. Follow along as Kojenov guides you through firmware analysis, decompiling, code review, and vulnerability demonstrations, showcasing how application security principles can be applied to IoT devices. Gain insights into the evolving landscape of tiny general-purpose computers and learn how to approach them from an AppSec perspective. Discover the similarities between attacking IoT devices and conventional applications, and be inspired to expand your security expertise into new domains.

Pwning IoT Devices Through Their Applications - From AppSec to IoT Security

OWASP Foundation
Add to list
0:00 / 0:00