ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

DEF CON 30 - Sam Quinn, Steve Povolny - Perimeter Breached Hacking an Access Control System

DEF

CON

DEFCON

DEF CON

hacker conference

security conference

information security conference

information security

conference speakers

hackers

hacking

hacking videos

security research

DEF CON 30

DC30

Автор: DEFCONConference

Загружено: 2022-10-17

Просмотров: 33123

Описание: The first critical component to any attack is an entry point. As we lock down firewalls and routers, it can be easy to overlook the network-connected physical access control systems. A study done by IBM in 2021 showed that the average cost of a physical security compromise is $3.54 million and takes an average of 223 days to identify a breach.

HID Mercury is a global distributor of access control systems with more than 20 OEM partners, deployed across multiple industries and certified for use in federal and state government facilities.

Trellix's Advanced Threat Research team uncovered 4 unique 0-day vulnerabilities and 4 additional undisclosed vulnerabilities leading to remote, unauthenticated code execution on multiple HID Mercury access control panels. These findings lead to full system control including the ability for an attacker to remotely manipulate door locks. During this presentation, we will briefly cover the hardware debugging process, leading to a root shell on the target. We will explore in greater depth the vulnerability discovery techniques, including emulation, fuzzing, static and dynamic reverse engineering, and a detailed walkthrough of several of the most critical vulnerabilities. We’ll address our approach to exploitation using simplistic malware we designed to control system functionality and culminate the talk with a live demo featuring full system control, unlocking doors remotely without triggering any software notification

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
DEF CON 30 - Sam Quinn, Steve Povolny  - Perimeter Breached Hacking an Access Control System

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

DEF CON 30 - Tomer Bar - OopsSec -The bad, the worst and the ugly of APT’s operations security

DEF CON 30 - Tomer Bar - OopsSec -The bad, the worst and the ugly of APT’s operations security

DEF CON 30  - Sharon Brizinov - Evil PLC Attacks - Weaponizing PLCs

DEF CON 30 - Sharon Brizinov - Evil PLC Attacks - Weaponizing PLCs

[1040] Fingerprint/RFID Lock Defeated With a Paperclip (Mengqi-Control)

[1040] Fingerprint/RFID Lock Defeated With a Paperclip (Mengqi-Control)

DNS Remote Code Execution: Finding the Vulnerability 👾 (Part 1)

DNS Remote Code Execution: Finding the Vulnerability 👾 (Part 1)

DEF CON 30 - Lennert Wouters - A Black-Box Security Evaluation of SpaceX Starlink User Terminal

DEF CON 30 - Lennert Wouters - A Black-Box Security Evaluation of SpaceX Starlink User Terminal

I Hacked This Temu Router. What I Found Should Be Illegal.

I Hacked This Temu Router. What I Found Should Be Illegal.

Samy Kamkar's Crash Course in How to Be a Hardware Hacker

Samy Kamkar's Crash Course in How to Be a Hardware Hacker

DEF CON 32 - Hacking Millions of Modems and Investigating Who Hacked My Modem - Sam Curry

DEF CON 32 - Hacking Millions of Modems and Investigating Who Hacked My Modem - Sam Curry

CNV - The Docker Blind Spot

CNV - The Docker Blind Spot

DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini

DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini

Массовый забой скота. Протестам в России быть? Зачем Трампу Иран. Максим Шевченко: Особое мнение

Массовый забой скота. Протестам в России быть? Зачем Трампу Иран. Максим Шевченко: Особое мнение

DEF CON 30 - Tristan Miller - Reversing the Original Xbox Live Protocols

DEF CON 30 - Tristan Miller - Reversing the Original Xbox Live Protocols

Hacker's Guide to UART Root Shells

Hacker's Guide to UART Root Shells

Блокировка Telegram в России началась. Кто победит?

Блокировка Telegram в России началась. Кто победит?

Babak Javadi - Basics of Hacking Physical Access Control Systems - DEF CON 27 Wireless Village

Babak Javadi - Basics of Hacking Physical Access Control Systems - DEF CON 27 Wireless Village

DEF CON 30 - Bill Graydon -  Defeating Moving Elements in High Security Keys

DEF CON 30 - Bill Graydon - Defeating Moving Elements in High Security Keys

Поймай ВСЕ обратные снаряды во время взлома! (ЗЛОДЕЙ)

Поймай ВСЕ обратные снаряды во время взлома! (ЗЛОДЕЙ)

Как Ubuntu Предала Linux - Вся Правда о Взлёте и Падении Canonical

Как Ubuntu Предала Linux - Вся Правда о Взлёте и Падении Canonical

Полная блокировка ❌ Зачем они это делают? В чём смысл? || Дмитрий Потапенко* и Дмитрий Дёмушкин

Полная блокировка ❌ Зачем они это делают? В чём смысл? || Дмитрий Потапенко* и Дмитрий Дёмушкин

Hack All The Things: 20 Devices in 45 Minutes

Hack All The Things: 20 Devices in 45 Minutes

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]