4.9 • 696 Ratings
🗓️ 23 August 2016
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Tuesday, August 23rd, 2016 edition of the Sansonet Storms and Stormcast. |
0:06.0 | My name is Johannes Ulrich and I'm recording from Jacksonville, Florida. |
0:11.0 | Let's focus today a little bit on the Inlet of Things again. |
0:15.0 | I haven't talked about this in a week or so, so got three different stories about the internet of things today, starting with |
0:22.9 | IOactive. IO. Active looked closer at a B.HU Wi-Fi router. This is a router that's usually |
0:29.9 | distributed in China. Of course, it may exist under other labels in the US as well, and it contains four critical vulnerabilities. |
0:40.8 | First of all, authentication isn't really verified. |
0:44.2 | All you need is the right cookie. |
0:46.6 | The actual value doesn't matter, |
0:49.2 | and you are logged in as administrator. |
0:52.7 | You can also, if you want to just access the router's system |
0:57.4 | logs which are not protected and find the right SID cookie value in that system log. And if all |
1:05.6 | fails, there is a third option. There is a magic SID value that always works. |
1:11.4 | Not that you really need it because, well, you can just use any SID value pretty much. |
1:17.4 | And once you're authenticated as an administrator, then you can access arbitrary system |
1:22.8 | commands as root just by exploiting a command injection vulnerability in this router. |
1:31.1 | The router also modifies all HD traffic passing through it and injects JavaScript into |
1:36.8 | it. |
1:37.8 | So probably shouldn't really use one of these devices. |
1:41.9 | Second one we got is a Wi-Fi control power socket. |
1:46.0 | Bit Defender took a closer look at it and found some very typical vulnerabilities. |
1:52.0 | First of all, weak default passwords and no obvious prompt to actually change it. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.