Главная
Study mode:
on
1
Intro
2
What is a Data Center?
3
Why Data Centers?
4
Database Initialization
5
Authentication Bypass #1 (cont.)
6
Authentication Bypass #2
7
Remote Code Execution
8
Dataprobe iBoot PDU
9
Full System Emulation
10
Authentication & "Autologin"
11
The Payload
12
Triaging Command Injection Opportunities
13
Final Take-aways
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore critical data center security vulnerabilities through a DEF CON 31 conference presentation that examines power management systems and infrastructure. Dive into nine discovered vulnerabilities affecting Power Distribution Units (PDUs) and Data Center Infrastructure Management (DCIM) systems, with detailed technical analysis of their most significant impacts. Learn about authentication bypasses, remote code execution possibilities, and system emulation techniques specifically related to data center operations. Understand how attackers could potentially exploit these vulnerabilities, challenging common assumptions about cloud security versus on-premises solutions. Gain valuable insights into database initialization, authentication mechanisms, command injection opportunities, and practical security implications for modern data centers. Master essential knowledge for data center professionals, security researchers, and those interested in critical infrastructure protection, aligning with current national cybersecurity priorities. Read more

Hacking Power Management in Data Centers - Security Vulnerabilities and Exploits

DEFCONConference
Add to list