Главная
Study mode:
on
1
Introduction
2
Presentation Overview
3
Agenda
4
What is VXWorks
5
Where VXWorks is used
6
Why are TCPIP stacks important
7
TCPIP stacks in the 90s
8
Wing Nuke
9
IP Net
10
Impact evangelism
11
SonicWALL
12
Overview
13
How it works
14
Basic TCP
15
TCP Window
16
Urgent Data
17
Urgent Pointer
18
Data Mechanism
19
VxWorks
20
Example 5 Way Handshake
21
Patient Monitor
22
Three Easy Steps
23
Dump the Framework
24
No Security Features
25
Heap exploitation strategy
26
Live demo
27
Patient monitor demo
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore a critical security presentation from Black Hat that unveils dangerous zero-day vulnerabilities in VxWorks, the most popular real-time operating system. Delve into the exploitation of these vulnerabilities on various devices, including printers and hospital patient monitors. Learn how these exploits can breach networks protected by NAT and firewalls through normal TCP connections. Understand the importance of TCP/IP stacks, their evolution since the 1990s, and the specific vulnerabilities in VxWorks. Witness live demonstrations of exploits, including a potentially life-threatening attack on a hospital bedside patient monitor. Gain insights into heap exploitation strategies and the lack of security features in affected systems. This 44-minute talk by Ben Seri and Dor Zusman provides a comprehensive look at the critical security implications for devices running VxWorks and the urgent need for improved security measures in real-time operating systems.

Critical Zero Days Remotely Compromise the Most Popular Real-Time OS

Black Hat
Add to list