Главная
Study mode:
on
1
Introduction
2
Disclaimer
3
Introducing Carrot
4
Downloading Firmware
5
OffTarget Vulnerability Research
6
Heap Memory
7
Dan Crowley
8
Python Module Hijacking
9
Debugging Tools
10
Removing ThirdParty Servers
11
Google Protocol Buffers
12
Reverse Protocol Buffers
13
Moving the Third Party Server
14
Debugging
15
Authentication
16
Demo
17
Why was that important
18
What was the functionality
19
Player remote file overwrite
20
Limitations
21
Results
22
What can you do
23
Conclusion
Description:
Explore the intricacies of hacking an internet-enabled rabbit-like device in this 40-minute conference talk from the 44CON Information Security Conference. Delve into ARM exploitation techniques, including reverse engineering, cross-compiling, protocol analysis, and exploit development. Follow the speaker's journey through authentication bypass, jump table corruptions, and heap overflows, leading to unauthenticated ear wiggling exploits and remote code execution vulnerabilities. Learn about the processes and procedures used to identify and exploit vulnerabilities in the Karotz "smart companion," covering topics such as firmware analysis, off-target vulnerability research, debugging tools, Google Protocol Buffers, and authentication mechanisms. Gain insights into the ethical implications and practical applications of IoT device security research.

Hacking an Internet Enabled Lagomorph

44CON Information Security Conference
Add to list