Completed
Intro
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
House Intercoms Attacks - When Frontdoors Become Backdoors
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Intercoms today
- 3 Human curiosity...
- 4 Context
- 5 Different types of intercoms
- 6 Numeric intercoms: simplified architecture
- 7 Network architecture with M2M
- 8 Different brands market
- 9 State Of the Art: tools
- 10 GSM and GPRS: authentication
- 11 GSM and GPRS: Handover
- 12 3G/4G: advantages
- 13 Mobile interception: signal attraction A User Equipment connects to the closest Base Station
- 14 Jamming is generally basic...
- 15 GSM Lab setup: for interception
- 16 Intercom setup: configuration
- 17 First impressions
- 18 Attacker steps to open the door
- 19 To trap the intercom
- 20 What's next? Let's backdoor it!
- 21 Call premium rate numbers
- 22 Attack vectors with M2M Intercoms
- 23 Bruteforce accounts
- 24 Enumerated accounts
- 25 Attack scenarios
- 26 Reverse look-up directories
- 27 Connecting to the M2M network
- 28 Traceroute in the M2M virtual network
- 29 Conclusion
- 30 Security recommendations for M2M solutions