Hack All The Things: 20 Devices in 45 Minutes

preview_player
Показать описание
When we heard Hack All The Things, we took it as a challenge. So at DEF CON this year we're doing exactly that, we're hacking everything. We've taken all of our previous experience exploiting embedded devices and used it to bring you a presentation filled with more exploits than ever before™. This presentation will feature exploits for over 20 devices including but not limited to TVs, baby monitors, media streamers, network cameras, home automation devices, and VoIP gateways. Gain root on your devices, run unsigned kernels; it's your hardware, it's internet connected, and it's horribly insecure.

Follow us at: @Exploiteers
Рекомендации по теме
Комментарии
Автор

I once took apart a Soviet washing machine. A top loader with an U880 (Z80 clone) controller board. No washing machine, toaster, stove or refrigerator needs more processing power than that.

statinskill
Автор

the more technologically advanced our security becomes the more absolutely a hacker can control every aspect of the environment around that system with virtually the smallest access flaw.

aunderiskerensky
Автор

Half you guys never get the reactions you're expecting, don't forget your audience is full of people just like you, these exploits are amazingly simple and you guys are awesome, keep laughing and keeping up the great work!

JamiePineappleWyatt
Автор

If you have physical access to a device, there is no reason you shouldn't be able to root it.

TheCynicalDude_
Автор

sweet i can ddos my toaster cuz of this vid!

speedplays
Автор

That hans guy did a great job at explaining stuff! I've never dug into those types of boards and what not but he was good at explaining them into simple concepts I thought. Good work dude!

mainHERO
Автор

Hmmm... time to create a light bulb bot net to DDOS stuff.

johnmorganbryan
Автор

Device 20 looks like the inspiration for the first CSI: Cyber episode.

Автор

20 decives in 45 minutes? That seems beyond human speed. That would probably work if they hacked a public wifi.

vortex
Автор

aha why was this deleted from the DEFCONConference youtube playlist
"spam, scams, and commercially deceptive content" ?

did one of the vendors get upset and report the video because their device was insecure?

YumekuiNeru
Автор

I don't really get what's the point of hacking these hardware systems... What useful stuff can you do with it afterwards? If you build such a system, why would you even try to protect it from being "hacked"? Isn't the shell interface exactly what the 4 UART pins are for? How is this still hacking?

TheMcSebi
Автор

The guy at 25:00, he seems to be addicted to Rockstar's...
But don't tell him, he might hack my CFL light bulbs and catch them on fire.

spydergs
Автор

Not my field, but I am really interested in the hacking of all aspects of devices and the intelligence of these smart Individuals.

danielmora
Автор

"Without further ado" occurs at 4:25.

TheDavidlloydjones
Автор

Nice presentation! Learned a few tricks by watching this. This is useful in a security and hack prevention perspective.

bloguetronica
Автор

By downloading the link to the upload, you can hack time.Its true, I saw hackerman post a tutorial on it when he sent a kung fu cop back in time to fight Kung Fuhrer. Luckily Triceri-cops (his partner who is also a dinosaurs), viking babes with guns, a T-Rex, and Thor all came to too defeat the Nazis.

blitzshcker
Автор

Might I suggest "hacking all the things" BEFORE "drinking all the booze"?

ChaplainDaveSparks
Автор

When You Don't Know Who Somebody Is And You Are Interviewed, Trained, And Paid To Keep It That Way

mariarahelvarnhagen
Автор

I'm fascinated but have to ask, apart from "Just because I can", why would you want to Root your Printer? Thanks for the great presentation!

suvetar
Автор

lol every time this guy says root he laughs haha 26:06

jaydenphillips-bradshaw