@ portscan-> found ftp -> did enumeration-> found default cred login -> in ftp rootfs access is granted -> dumped entire filesystem-> can modify entire fs, etc
This is why I love this channel, any talk I might have had to miss or force to choose over the other is right on this channel... Thanks DEFCONconferences
Just learned a lot, thanks. I love watching these DEFCON talks, because I’m never able to go, so it’s nice that we can still get acres to the talks because every year I seem to learn so much from these.
Wow super useful talk, thanks! I've been interested in IoT hacking but too busy to look into it, I just happen to have almost all the tools and a cheap router... And some free time...
Power capacitors that are discharged can develop ‘phantom charge’ as the dielectric was in a contrary position physically for longer duration. Ambient charge is enough to cause the capacitor’s to return to previous charged state.
A lot of devices nowadays have parasitic resistors to make them safe(r) but I still always short the big filter caps just to make sure. And I do indeed get some sparks sometimes
Great presentation, thank you for the clear and concise talk. I believe you said that folks there could get a copy of your slides but would you mind making them available to the rest of us?
Thanks for this I really appreciated the information, finally understand what I was doing when I soldered all those wires to my Xbox 360 board I never knew why it was called JTAG but now I do
These talks just reinforce the reason i dont have IoT, smart devices, or really much of anything in my house. The fact that i have wifi makes me paranoid enough.
My iot lights use WiFi to make themselves into motion sensors! They send it between themselves and see where they are interrupted! Any WiFi enabled device could potentially do this, your WiFi can tell where you are in your house
bruh im kinda scared rn.. my cats new litterbox needed to connect to wifi (allegedly for firmware updates) same with the vaccum! both made in china btw :(
When i see someone Who really knows what he s talking about ❤ how much i love that stuff unfortunately i m not lucky and good enough to make a living with it Bless Bellini ciao
Remember those books from the 90s and early 2000s that claimed this…. But when you read them, they are the basics to using a console or lessons on OSI and TCP/IP? 😂❤
Is it sad that my immediate definition for an LoT device is that it means "Left on table". 😂 Like when people leave their devices unattended. Don't mind me, kinda new here. Lol
Probably one of the clearest and most concise talks this year from what I've seen so far
Found 5 vulnerabilities on the first day. 1 critical, 1 high. Thanks man. This sparked a curiosity
Hi bro, how did you do it? Can you share some relevant basic information?
@ portscan-> found ftp -> did enumeration-> found default cred login -> in ftp rootfs access is granted -> dumped entire filesystem-> can modify entire fs, etc
@@weihe1220did you watch the video?
This is why I love this channel, any talk I might have had to miss or force to choose over the other is right on this channel... Thanks DEFCONconferences
Without a doubt this is the best IoT hacking speed run out there.
"we're expecting there to be a big surge of IoT devices because of AI" is just about the scariest news someone could drop
Just learned a lot, thanks. I love watching these DEFCON talks, because I’m never able to go, so it’s nice that we can still get acres to the talks because every year I seem to learn so much from these.
Wow super useful talk, thanks! I've been interested in IoT hacking but too busy to look into it, I just happen to have almost all the tools and a cheap router... And some free time...
Power capacitors that are discharged can develop ‘phantom charge’ as the dielectric was in a contrary position physically for longer duration. Ambient charge is enough to cause the capacitor’s to return to previous charged state.
A lot of devices nowadays have parasitic resistors to make them safe(r) but I still always short the big filter caps just to make sure. And I do indeed get some sparks sometimes
Great presentation, thank you for the clear and concise talk. I believe you said that folks there could get a copy of your slides but would you mind making them available to the rest of us?
Thanks for this I really appreciated the information, finally understand what I was doing when I soldered all those wires to my Xbox 360 board I never knew why it was called JTAG but now I do
07:58 Capacitors at even 5V or 12V: "hold my beer."
These talks just reinforce the reason i dont have IoT, smart devices, or really much of anything in my house. The fact that i have wifi makes me paranoid enough.
My iot lights use WiFi to make themselves into motion sensors!
They send it between themselves and see where they are interrupted!
Any WiFi enabled device could potentially do this,
your WiFi can tell where you are in your house
@@Frappe3621 New fear unlocked.
bruh im kinda scared rn.. my cats new litterbox needed to connect to wifi (allegedly for firmware updates) same with the vaccum! both made in china btw :(
1: pick the target, usually the target is the device not the person. Usually...
What was the software being used in the Reverse Engineering binaries & libs section?
Nevermind... it's called Ghidra
@@joew1865 yes and it is suggested to use with Amazon Coretto rather than regular Java
Damn I needed this; thank you for this! Been looking for something like this.
Been making my own showdan type project locally scanning for IoT and rigged a grep script for it
somebody knows any resource to keep digging in the iot / hardware hacking?
Really enjoyed it! Thanks
Sounds fun!
I followed this beginner guide and I just couldn’t hack it.
8:55 He should have said "unplug the power cord."
I took screenshots of all the slides and fed to my AI to summarise. Did a good job 😊
Amazing idea💥 Did de same thanks
why wouldnt you just copy paste the transcript...
@3rdeyesociety on phone and can't copy. Tried that first
@@3rdeyesociety I tried but phone would not let me. Took a while to get every slide lol
Like Harvard or EC-COUNCIL University or etc for cyber degrees
We need 6 more likes on this video! No more, no less!
When i see someone Who really knows what he s talking about ❤ how much i love that stuff unfortunately i m not lucky and good enough to make a living with it Bless Bellini ciao
Hack or be hacked. It's like being blind and while they all can see.
Remember those books from the 90s and early 2000s that claimed this…. But when you read them, they are the basics to using a console or lessons on OSI and TCP/IP? 😂❤
Is it sad that my immediate definition for an LoT device is that it means "Left on table". 😂 Like when people leave their devices unattended. Don't mind me, kinda new here. Lol
this is why I never use my phone or pc to control any of these things
Botnet: Online DDOS or DOS attack.
Anyone hardware hacking in Austin, feel free to PM