Completed
0:00: Intro
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Anyone Can Find This IoT Vulnerability - Command Injection Tutorial
Automatically move to the next video in the Classroom when playback concludes
- 1 0:00: Intro
- 2 1:15: What is Command Injection
- 3 2:13: Getting the firmware
- 4 5:02: Unpacking firmware
- 5 9:50: Enumerating root file system
- 6 17:07: TCM certification message
- 7 17:41: Exploring web interface
- 8 23:59: Tracing logging strings to binaries and libs
- 9 26:53: Reverse engineering with Ghidra
- 10 32:56: Exploiting vulnerability