Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Rebadged, Relabeled, Rooted - Pwnage via Solar Supply Chain

DEFCONConference via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Discover critical security vulnerabilities in residential solar energy systems through this 33-minute DEF CON 33 conference talk that exposes how solar microgrids can be compromised through supply chain weaknesses. Learn about real-world attack vectors including unauthenticated cloud APIs, unsigned firmware updates, hardcoded root credentials, and vendor-enabled kill switches that plague today's solar infrastructure. Explore practical demonstrations of account takeover techniques using brute-forced PINs, remote access to power dashboards with zero authentication requirements, firmware tampering methods for establishing persistent implants, and replay attacks targeting plaintext MODBUS communications. Understand how security flaws propagate across rebadged OEM devices and shared cloud infrastructure, transforming individual vulnerabilities into industry-wide risks that affect the entire solar supply chain. Examine the gap between the promise of energy independence and the reality of insecure firmware, exposed APIs, and devices that communicate with unknown servers, fundamentally challenging assumptions about off-grid security and revealing why solar energy systems require a complete threat model reassessment.

Syllabus

DEF CON 33 - Rebadged, Relabeled, Rooted: Pwnage via Solar Supply Chain - Anthony Rose, Jake Krasnov

Taught by

DEFCONConference

Reviews

Start your review of Rebadged, Relabeled, Rooted - Pwnage via Solar Supply Chain

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.