
Sign up to save your podcasts
Or
M. Carlton joined us to talk about being part of leading professional reverse engineering team at Senr.io. We discussed her Embedded Systems talk about IoT and in particular Devil’s Ivy (Check out the important ROP video to better understand the key concept ). In this particular case, they found that the M300 camera model using GSOAP (SOAP) parse for buffer overflow.
Not only did this issue allow spread quickly as a DOS among the M300 cameras but over 200 other Axis cameras (Hurray for code-reuse) due to using the third party code library.
M. uses several tools in her work:
She had some excellent suggestions for improving the odds of NOT getting hacked:
In the worse case, plan in advance for a security breach to expedite deployment.
Have comments or suggestion names for us? Find us on twitter @unnamed_show, or email us at [email protected].
Music by TeknoAxe (http://www.youtube.com/user/teknoaxe)
4.8
4040 ratings
M. Carlton joined us to talk about being part of leading professional reverse engineering team at Senr.io. We discussed her Embedded Systems talk about IoT and in particular Devil’s Ivy (Check out the important ROP video to better understand the key concept ). In this particular case, they found that the M300 camera model using GSOAP (SOAP) parse for buffer overflow.
Not only did this issue allow spread quickly as a DOS among the M300 cameras but over 200 other Axis cameras (Hurray for code-reuse) due to using the third party code library.
M. uses several tools in her work:
She had some excellent suggestions for improving the odds of NOT getting hacked:
In the worse case, plan in advance for a security breach to expedite deployment.
Have comments or suggestion names for us? Find us on twitter @unnamed_show, or email us at [email protected].
Music by TeknoAxe (http://www.youtube.com/user/teknoaxe)
1,985 Listeners
30,651 Listeners
230 Listeners
188 Listeners
7,959 Listeners
44 Listeners
64 Listeners