House Intercoms Attacks - When Frontdoors Become Backdoors

House Intercoms Attacks - When Frontdoors Become Backdoors

Cooper via YouTube Direct link

Intro

1 of 30

1 of 30

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

House Intercoms Attacks - When Frontdoors Become Backdoors

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Intercoms today
  3. 3 Human curiosity...
  4. 4 Context
  5. 5 Different types of intercoms
  6. 6 Numeric intercoms: simplified architecture
  7. 7 Network architecture with M2M
  8. 8 Different brands market
  9. 9 State Of the Art: tools
  10. 10 GSM and GPRS: authentication
  11. 11 GSM and GPRS: Handover
  12. 12 3G/4G: advantages
  13. 13 Mobile interception: signal attraction A User Equipment connects to the closest Base Station
  14. 14 Jamming is generally basic...
  15. 15 GSM Lab setup: for interception
  16. 16 Intercom setup: configuration
  17. 17 First impressions
  18. 18 Attacker steps to open the door
  19. 19 To trap the intercom
  20. 20 What's next? Let's backdoor it!
  21. 21 Call premium rate numbers
  22. 22 Attack vectors with M2M Intercoms
  23. 23 Bruteforce accounts
  24. 24 Enumerated accounts
  25. 25 Attack scenarios
  26. 26 Reverse look-up directories
  27. 27 Connecting to the M2M network
  28. 28 Traceroute in the M2M virtual network
  29. 29 Conclusion
  30. 30 Security recommendations for M2M solutions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.