Главная
Study mode:
on
1
Intro
2
Lab equipment
3
Step 1 - Firmware updates
4
Reverse Engineering
5
Network Protocol
6
Packet Header
7
Looking for vulnerabilities - IP150 Login Page
8
CVE-2020-25189
9
Solution - ROP Chain
10
Shellcode [1] - memory dumper
11
Shellcode [2] - Switch Ports
Description:
Explore a Black Hat conference talk that delves into remotely exploiting and disarming a popular physical security system from the public internet. Learn about two remote code execution vulnerabilities (CVE-2020-25189 and CVE-2020-25185) discovered in a Paradox security system. Follow the presenter's journey through reverse engineering, network protocol analysis, and vulnerability discovery in the IP150 Login Page. Gain insights into developing ROP chain solutions and crafting shellcode for memory dumping and port switching. Understand the real-world application of hacking techniques often depicted in movies, as the talk breaks down the process of remotely disabling alarms for potential security breaches.

Alarm.DISARM - Remotely Exploiting & Disarming Popular Physical Security System from Public Internet

Black Hat
Add to list