HackersOnBoard
HackersOnBoard
  • Видео 3 906
  • Просмотров 9 383 223
DEF CON 27 - Stephan Huber - Im on Your Phone Listening Attacking VoIP Configuration Interfaces
If toasters talking to fridges is no joke to you, then you are aware of the big Internet of Things hype these days. While all kind of devices get connected and hacked, one of the oldest class of IoT devices seems to be forgotten even though it is literally everywhere - VoIP phones.
For configuration and management purposes, VoIP phones run a web application locally on the device. We found several critical bugs (reported CVEs) in the web application as well as in the webserver which enabled us to hijack the phones. Starting with simple XSS and CSRF issues, via command injections and memory corruptions right through to remote code executions, all popular vulnerability classes can be found on...
Просмотров: 5 184

Видео

DEF CON 27 - The Dark Tangent - Closing Ceremonies
Просмотров 2,2 тыс.4 года назад
DEF CON 27 draws to a close. Prizes awarded, Black Badge winners announced, thanks given, future plans revealed.
DEF CON 27 - More Keys Than A Piano: Finding Secrets In Publicly Exposed Ebs Volumes
Просмотров 3,7 тыс.4 года назад
Did you know that Elastic Block Storage (Amazon EBS) has a "public" mode that makes your virtual hard disk available to anyone on the internet? Apparently hundreds of thousands of others didn't either, because they're out there exposing secrets for everyone to see. I tore apart the petabytes of data for you and have some dirty laundry to air: encryption keys, passwords, authentication tokens, P...
DEF CON 27 - Panel - Hacking Congress The Enemy Of My Enemy Is My Friend
Просмотров 1,5 тыс.4 года назад
A SIMULATED crisis is unfolding on a national scale, based loosely on the NotPetya attack of 2017. Triggered by a yet-unknown adversary, what started as a an isolated technical issue has quickly escalated into a society-wide event affecting millions of citizens, several industries, and spanning government jurisdictions. Who is in charge, how do they cooperate with others, and how do they make d...
DEF CON 27 - Pedro Cabrera Camara - SDR Against Smart TVs URL and Channel Injection Attacks
Просмотров 2,8 тыс.4 года назад
Software-defined-radio has revolutionized the state of the art in IoT security and especially one of the most widespread devices: Smart TV. This presentation will show in detail the HbbTV platform of Smart TV, to understand and demonstrate two attacks on these televisions using low cost SDR devices: TV channel and HbbTV server impersonation (channel and URL injection). This last attack will all...
DEF CON 27 - Backdooring Hardware Devices By Injecting Malicious Payloads On Microcontrollers
Просмотров 3 тыс.4 года назад
Is targeting microcontrollers worth the effort? Nowadays, they are responsible for controlling a wide range of interesting systems, e.g., physical security systems, car's ECUs, semaphores, elevators, sensors, critical components of industrial systems, some home appliances and even robots. In this talk, it will be explained how microcontrollers can be backdoored too. After a quick review of basi...
DEF CON 27 - Xiling Gong - Exploiting Qualcomm WLAN and Modem Over The Air
Просмотров 1,9 тыс.4 года назад
In this talk, we will share our research in which we successfully exploit Qualcomm WLAN in FIRMWARE layer, break down the isolation between WLAN and Modem and then fully control the Modem over the air. Setup the real-time debugger is the key. Without the debugger, it's difficult to inspect the program flow and runtime status. On Qualcomm platform, subsystems are protected by the Secure Boot and...
DEF CON 27 - Patrick Wardle - Harnessing Weapons of Mac Destruction
Просмотров 1,2 тыс.4 года назад
Whenever a new Mac malware specimen is uncovered, it provides a unique insight into the offensive Mac capabilities of hackers or nation-state adversaries. Better yet, such discoveries provide fully-functional capabilities that may be weaponized for our own surreptitious purposes! I mean, life is short, why write your own? We'll begin this talk by discussing the methodology of subverting existin...
DEF CON 27 - Xiaolong Bai - HackPac Hacking Pointer Authentication in iOS User Space
Просмотров 8204 года назад
Pointer Authentication (in short, PAuth) is the latest security mechanism in iOS. It is proposed to protect the integrity of pointers with hardware-assisted encryption, thus eliminating the threats of code-reuse attacks. In PAuth, a cryptographic signature called PAC is calculated from a pointer value and inserted into the pointer. When the pointer is about to be used, the PAC is extracted and ...
DEF CON 27 - Bug Finding And Exploit Techniques On File Transfer App Of All Top Android Vendors
Просмотров 1,6 тыс.4 года назад
Nearby sharing apps are very convenient and fast when you want to transfer files and have been pre-installed on billions of devices. However, we found that most of them will also open a door for attackers to steal your files and even more. First, we did a comprehensive research about all top mobile vendors' pre-installed nearby sharing apps by reverse engineering. Many serious vulnerabilities a...
DEF CON 27 - Wenxiang Qian - Breaking Google Home: Exploit It with SQLite(Magellan)
Просмотров 7964 года назад
Over the past years, our team has used several new approaches to identify multiple critical vulnerabilities in SQLite and Curl, two of the most widely used basic software libraries. These two sets of vulnerabilities, which we named "Magellan" and "Dias" respectively, affect many devices and software. We exploited these vulnerabilities to break into some of the most popular Internet of things de...
DEF CON 27 - Roger Dingledine - The Tor Censorship Arms Race The Next Chapter
Просмотров 1,5 тыс.4 года назад
Tor is a free-software anonymizing network that helps people around the world use the Internet in safety. But who cares how good Tor's privacy is, if your government prevents you from reaching the Tor network? In the beginning, some countries filtered torproject.org by DNS (so we made website mirrors and an email autoresponder for downloading Tor), and then some countries blocked Tor relays by ...
DEF CON 27 - Behind the Scenes The Industry of Social Media Manipulation Driven by Malware
Просмотров 2 тыс.4 года назад
This talk is the grand finale of a four-year long investigation that started with analyzing an IoT botnet, to discovering the structured industry that exists behind social media manipulation (SMM). SMM is the deliberate act of paying for popularity with followers or activity on social media. Adopting a bottom-up approach, the thorough methodology undertook to study the botnet will be presented:...
DEF CON 27 - WillC - Phreaking Elevators
Просмотров 2,2 тыс.4 года назад
This is a comprehensive dive into the current emergency phones with an in-depth look at the phones used in elevators. This talk will provide unique insight into a topic that hasn't been covered before: Elevator Phones. During this talk, I will discuss the commonality between elevator phone brands. I will cover a new, never before released, set of default passwords these system use. I will show ...
DEF CON 27 - Truman Kain - Surveillance Detection Scout Your Lookout on Autopilot
Просмотров 1,3 тыс.4 года назад
Surveillance detection routes are a daily occurrence for clandestine operatives and agents all over the world. These mentally taxing counter-surveillance measures often mean the difference between life and death. Surveillance Detection Scout hopes to ease that burden. Scout currently supports Tesla Models S, 3 and X, running license plate recognition on 3 camera feeds to alert you in real time ...
DEF CON 27 - Intro to Embedded Hacking-How you can find a decade old bug in widely deployed devices
Просмотров 4,5 тыс.4 года назад
DEF CON 27 - Intro to Embedded Hacking-How you can find a decade old bug in widely deployed devices
DEF CON 27 - All the things you wanted to know about the DEF CON NOC and we won't tell you about
Просмотров 3534 года назад
DEF CON 27 - All the things you wanted to know about the DEF CON NOC and we won't tell you about
DEF CON 27 - XiaoHuiHui - All the 4G Modules Could Be Hacked
Просмотров 7394 года назад
DEF CON 27 - XiaoHuiHui - All the 4G Modules Could Be Hacked
DEF CON 27 - smea - Adventures In Smart Buttplug Penetration testing
Просмотров 2,1 тыс.4 года назад
DEF CON 27 - smea - Adventures In Smart Buttplug Penetration testing
DEF CON 27 - Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits
Просмотров 6164 года назад
DEF CON 27 - Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits
DEF CON 27 - Panel - DEFCON Wants to Help Hackers Anonymously Submit Bugs to the Government
Просмотров 3604 года назад
DEF CON 27 - Panel - DEFCON Wants to Help Hackers Anonymously Submit Bugs to the Government
DEF CON 27 - Can You Track Me Now? Why The Phone Companies Are Such A Privacy Disaster
Просмотров 1,2 тыс.4 года назад
DEF CON 27 - Can You Track Me Now? Why The Phone Companies Are Such A Privacy Disaster
DEF CON 27 - Nikhil Mittal - RACE - Minimal Rights and ACE for Active Directory Dominance
Просмотров 6394 года назад
DEF CON 27 - Nikhil Mittal - RACE - Minimal Rights and ACE for Active Directory Dominance
DEF CON 27 - Confessions of an Nespresso Money Mule Free Stuff and Triangulation Fraud
Просмотров 2,5 тыс.4 года назад
DEF CON 27 - Confessions of an Nespresso Money Mule Free Stuff and Triangulation Fraud
DEF CON 27 - No Mas How One Side-Channel Flaw Opens Atm Pharmacies & Government Secrets Up to Attack
Просмотров 5744 года назад
DEF CON 27 - No Mas How One Side-Channel Flaw Opens Atm Pharmacies & Government Secrets Up to Attack
DEF CON 27 - Infiltrating Corporate Intranet Like NSA _Pre-auth RCE on Leading SSL VPNs
Просмотров 7674 года назад
DEF CON 27 - Infiltrating Corporate Intranet Like NSA _Pre-auth RCE on Leading SSL VPNs
DEF CON 27 - Omer Gull - SELECT code execution FROM USING SQLite
Просмотров 3784 года назад
DEF CON 27 - Omer Gull - SELECT code execution FROM USING SQLite
DEF CON 27 - Campbell Murray - GSM We Can Hear Everyone Now
Просмотров 6104 года назад
DEF CON 27 - Campbell Murray - GSM We Can Hear Everyone Now
DEF CON 27 - Bruce Schneier - Information Security in the Public Interest
Просмотров 3254 года назад
DEF CON 27 - Bruce Schneier - Information Security in the Public Interest
DEF CON 27 - albinowax - HTTP Desync Attacks Smashing into the Cell Next Door
Просмотров 2314 года назад
DEF CON 27 - albinowax - HTTP Desync Attacks Smashing into the Cell Next Door

Комментарии

  • @danman1012
    @danman1012 4 дня назад

    What's funny about this, in 2024 this has grown lol. He shared a lot of scripts that still work today.

  • @nawfelbengherbia8302
    @nawfelbengherbia8302 9 дней назад

    Nice work. Thanks for sharing!

  • @Hex-Mas
    @Hex-Mas 19 дней назад

    The Lazer Lock lol

  • @schotic
    @schotic 22 дня назад

    I'm going to learn how to do this.

  • @Sneybrot89
    @Sneybrot89 27 дней назад

    Help people; How do I contact him? it's for a task

  • @PratyakshaBeri
    @PratyakshaBeri 28 дней назад

    Amazing talk! Idk how it has gone unnoticed for 8 years. If the speaker is still interested in internet censorship in India, please drop your email. I’m looking to research how this changed over the years. Thanks and once again, super informative talk

  • @MrLoLFaQ
    @MrLoLFaQ Месяц назад

    Diese Kette immer, erst ein Video über Red Star OS gesehen, dann Wikipedia, dann gelesen, dass es ein Talk darüber gibt, nun hier.

  • @nublex
    @nublex Месяц назад

    11 years old but pretty darn expressive

  • @doctorreviewsindia
    @doctorreviewsindia Месяц назад

    Very nice

  • @user-zf9dv8kg7q
    @user-zf9dv8kg7q Месяц назад

    minister collins investergated his death could asked me he od on hard drugs wasnt sueside. have photo took 45 minites b4 died talked chat bout fear public of medicial device wifi nation wide attack dhb data bases serial codes for frimware access

  • @ChaplainDaveSparks
    @ChaplainDaveSparks 2 месяца назад

    That DF antenna array looks a lot like the _"LoJack"_ stolen car finder that many police agencies (at least here in Southern California) use. If I remember correctly, there is one antenna in the center and four at 90 degrees around a circle.

  • @DemocracyManifest-vc5jn
    @DemocracyManifest-vc5jn 2 месяца назад

    Great talk but these talkers were fighting for attention and need to work on their teamwork. Geez how old are they. Maybe they’re just excited about their talk?

  • @florencetown4024
    @florencetown4024 2 месяца назад

    20:00

  • @dedricklewis7168
    @dedricklewis7168 2 месяца назад

    Thank you for this presentation. Because of this, I was inspired and created my own proton pack. But seriously, this is awesome and much appreciated.

  • @SirMika9
    @SirMika9 2 месяца назад

    The teacher is cool and know his stuff, but the incessant mostly inaudible questions makes this a complete mess. It took one hour to learn something I learned in 5 minutes elsewhere with a better visual and clearer presentation, and the whole video is confusing as hell and all the time going into every possible direction before the teacher can finish his starting point. Not beginner and "ages 4" friendly at all.

  • @eplus341
    @eplus341 2 месяца назад

    Imagine how AI can handle YOUR metadata and find everything about you without having to listen to your conversations and without technically having to break the law... the same effect for you as if it was breaking the law. The future of mankind lies within knowing what you are fighting for but not what you are fighting AGAINST. This is both terrifying and in a way optimistic.

  • @millionsubz3943
    @millionsubz3943 2 месяца назад

    Thanks

  • @Dje4321
    @Dje4321 2 месяца назад

    The primeagen really fucked things huh

  • @ramsaybolton9151
    @ramsaybolton9151 3 месяца назад

    It's sad that people do this to destroy the experience for other players. This is why I believe in violent punishment.

  • @Talel_kraiem
    @Talel_kraiem 3 месяца назад

    Considering the time of publishing this lecture this a truly eyes opening lecture for me who want to get into audio programming

  • @DragoNate
    @DragoNate 3 месяца назад

    actually, the concept of things being stored on your SIM card that you can easily pop out and move to another device isn't awful in itself. i see the issue of where that _would_ have led things, but if we could just use it to simply move important data around, it would be nice.

  • @harryman11
    @harryman11 3 месяца назад

    underrated talk

  • @klausstock8020
    @klausstock8020 3 месяца назад

    I expected a video about hacking RFZs vie radio; all I knew so far were wired RFZs (high-performance RFZs which need quite a bit of electrical power). No mentioning of RFZs in the video...

  • @Reichstaubenminister
    @Reichstaubenminister 4 месяца назад

    On Linux, running "ldd hello" gives you "ldd: warning: you do not have execution permission for `./hello'" if the binaary doesn't have the execute bit set.

  • @Creapture
    @Creapture 4 месяца назад

    1.2k views??? fuck you internet.

  • @mudspringer
    @mudspringer 4 месяца назад

    This is great stuff. I just bought The Analog Thing - can't wait for it to arrive!

  • @kevinmcnamee6006
    @kevinmcnamee6006 5 месяцев назад

    It's been over 10 years since I gave this presentation. I'm very pleased with the number of views, but somewhat disappointed with some of the comments that imply that this was a marketing presentation. It was certainly not a marketing presentation. While it is true that we developed "Very Angry Birds" demo to help promote a mobile malware detection product, the product was not mentioned at all in the presentation. The purpose presentation was two fold. First it shows how easy it was to inject malicious code into a legitimate Android application, and I think the presentation does an excellent job in showing the technical details of how to do this. Second, I wanted to wanted to show that mobile spyware was a major threat and demonstrate what it could do. This was three years before Pegasus Spyware was in the news and I think the presentation provides an insightful forward looking view of the potential for spyware apps in mobile phones. I may have got the bit about the age of the Rovio certificate wrong and there was a glitch with recording playback during the demo. For these I apologize. I can't do anything about the audio quality. I think it went quite well for a live demo that required a mobile phone, a laptop, and a remote server to all work flawlessly during a presentation to over 1000 people. It scared the heck out of me. The presentation was well received and got quite a bit of coverage in the media. I was interviewed by CNN's tech reporter Laurie Segall. My kids thought it was cool to seem me on TV. Kevin.

  • @johnkoury1116
    @johnkoury1116 5 месяцев назад

    Absolutely Fascinating!!

  • @zabdas83
    @zabdas83 5 месяцев назад

    FDM... lol does he mean MDF 😊😂😅

  • @alfredoneves3976
    @alfredoneves3976 5 месяцев назад

    nice

  • @JP-os7ph
    @JP-os7ph 6 месяцев назад

    AI is going to kick even hackers butts? Right?

  • @Dread_Pirate_Roberts_2013
    @Dread_Pirate_Roberts_2013 6 месяцев назад

    Very current presentation, yet it is 10 year old

  • @SovietTechnocracy-fy6xg
    @SovietTechnocracy-fy6xg 6 месяцев назад

    @20:25

  • @brashcrab
    @brashcrab 6 месяцев назад

    Guys....pour iced coffee on your computer 1:01

  • @Adhil_parammel
    @Adhil_parammel 6 месяцев назад

    27:20

  • @BraveLittIeToaster
    @BraveLittIeToaster 6 месяцев назад

    Is that vista?!

  • @heyheyhophop
    @heyheyhophop 7 месяцев назад

    Brilliant talk, but no 72p option for that extra blurry juicyness though? ;)

  • @lalanotlistening
    @lalanotlistening 7 месяцев назад

    “mean phrases will make people dislike you” - guy who put the R-slur in a powerpoint

  • @datvuong7420
    @datvuong7420 7 месяцев назад

    I had hard time trying to understand how the distributed hash table works on RUclips, this video just helped me that other videos can't

  • @dereisenadler6717
    @dereisenadler6717 7 месяцев назад

    Taking notes rn. Hopefully one day we can implement a superior version in the United States and stop the spread of degeneracy through the internet.

  • @Mixer-he2wb
    @Mixer-he2wb 7 месяцев назад

    Just thinking on the authentication error. Send bad ASCII. Bell tones?

  • @Q7SZuRt4
    @Q7SZuRt4 8 месяцев назад

    Thank you for being honest and upright , stay postive sir.🙏

  • @user-yc4hy4mf1p
    @user-yc4hy4mf1p 8 месяцев назад

    Funnymen CBD gummies reviews lololol 🤣

  • @deanvangreunen6457
    @deanvangreunen6457 8 месяцев назад

    "Free for indie developers" did not age well, with the #2023Chaos

  • @deanvangreunen6457
    @deanvangreunen6457 8 месяцев назад

    only issue is that if it had low video quality , when pausing or freezing the image, you will notice that from the user side that there are no artifacts, meaning that the user could detect that the image has been paused, such things which would add noise to a basic low video quality camera are nearby computers, other machines, maybe cleaning machines, or noise from the outside...

  • @andremapp6121
    @andremapp6121 8 месяцев назад

    Paul Graham is awesome.

  • @ClassicRiki
    @ClassicRiki 8 месяцев назад

    @HackersOnBoard what does everyone think of this theory about the Probers being predictably reliable and predictably unreliable? - I hypothesise that the sequence numbers being derived from the timestamp is the cause of the Prober failing every 25 hours. You’ll notice that the successful blocking by probes does not alter at the 25 hour intervals. So, thinking about it; once it successfully blocks a connection they might be getting automatically added to what essentially equates to a list of blacklisted connections. A presumption of guilt type of thing because the safest way for them is to presume it’s going to remain a ‘bad connection’ However, if it passes the initial probe…perhaps it is whitelisted; unless the sequence changes. You might think that if we think about 1-24 hours…why 25 hours? Well I’m thinking that because they are simply numbers (remember, once used for a sequence, it’s not understood by the network as a time value…it’s simply numerical) it’s not how we would think of it being 1-24. In reality it would be be 0,1,2,3….22,23,24. So how many sequences are generated using this method in 1 day? Well, 25 right? 00:00, 01;00, 02:00…and so on. So that’s 25 separate ‘seed times’ resulting in 25 sequence numbers. So I theorise that it’s the conversion from time value to pure numeric value that perhaps is generating repeating sequences. The pattern shows a repeating sequence and so it’s not even pseudo random. Does anyone have any thoughts on my theory?

  • @BeamerE30
    @BeamerE30 9 месяцев назад

    Fantastic presentation!

  • @RaimundPopp
    @RaimundPopp 9 месяцев назад

    thank you

  • @abitofyourbrain
    @abitofyourbrain 9 месяцев назад

    Oh, I forgot about this talk Absolutely pristine, well spoken wonderfully given talk on the subject Somehow, even as we reach DEFCON 31 somehow every part of this is still very very astute in regards to current affairs and Internet management Nothing changes really does it What a Time to be alive To this day, my absolute favorite lecture I do hope to find more by this man-he seems to be ahead of his time or conceptually people that make browsers don’t move with the times either way what a gem of a human So glad RUclips suggested it