ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

DEF CON 31 - Badge of Shame Breaking into Secure Facilities with OSDP -Dan Petro, David Vargas

DEF

CON

DEFCON

DEF CON

hacker conference

security conference

information security conference

information security

conference speakers

hackers

hacking

hacking videos

security research

DEF CON 31

OSDP

Dan Petro

David Vargas

Автор: DEFCONConference

Загружено: 2023-09-15

Просмотров: 103487

Описание: Breaking into secure facilities used to be possible by inserting a listening device (such as an ESPKey) behind an RFID card reader and sniffing the unencrypted Wiegand badge numbers over the wire as they go to the backend controller. The physical security industry has taken notice and there's a new sheriff in town: The encrypted protocol OSDP which is starting to be rolled into production. Surely encryption will solve our problems and prevent MitM attacks right? ... right?

In this presentation, we'll demonstrate over a dozen vulnerabilities, concerning problems, and general "WTF"s in the OSDP protocol that let it be subverted, coerced, and totally bypassed. This ranges from deeply in-the-weeds clever cryptographic attacks, to boneheaded mistakes that undermine the whole thing. We will also demonstrate a practical pentesting tool that can be inserted behind an RFID badge reader to exploit these vulnerabilities.

Get your orange vest and carry a ladder, because we're going onsite!

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
DEF CON 31 - Badge of Shame  Breaking into Secure Facilities with OSDP -Dan Petro, David Vargas

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

DEF CON 31 War Stories - Tracking the Worlds Dumbest Cyber Mercenaries - Cooper Quintin

DEF CON 31 War Stories - Tracking the Worlds Dumbest Cyber Mercenaries - Cooper Quintin

DEF CON 31 - Private Keys in Public Places - Tom Pohl

DEF CON 31 - Private Keys in Public Places - Tom Pohl

DEF CON 31 - Backdoor in the Core - Altering Intel x86 Instruction Set at Runtime -  Krog, Skovsende

DEF CON 31 - Backdoor in the Core - Altering Intel x86 Instruction Set at Runtime - Krog, Skovsende

DEF CON 32 -Your Smartcard is Dumb A Brief History of Hacking Access Control Systems - Chad Shortman

DEF CON 32 -Your Smartcard is Dumb A Brief History of Hacking Access Control Systems - Chad Shortman

Practice Management That Works

Practice Management That Works

The Search for the Perfect Door - Deviant Ollam

The Search for the Perfect Door - Deviant Ollam

Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках

Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках

DEF CON 31 - Terminally Owned - 60 Years of Escaping - David Leadbeater

DEF CON 31 - Terminally Owned - 60 Years of Escaping - David Leadbeater

DEF CON 32 - Unsaflok: Hacking millions of hotel locks - Lennert Wouters, Ian Carroll

DEF CON 32 - Unsaflok: Hacking millions of hotel locks - Lennert Wouters, Ian Carroll

Programming ▫️ Coding ▫️ Hacking ▫️ Designing Music 🦠

Programming ▫️ Coding ▫️ Hacking ▫️ Designing Music 🦠

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]