Most AI Pilots Fail to Scale. MIT Sloan Teaches You Why — and How to Fix It
Google, IBM & Meta Certificates — 40% Off for a Limited Time
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Discover critical security vulnerabilities in residential solar energy systems through this 33-minute DEF CON 33 conference talk that exposes how solar microgrids can be compromised through supply chain weaknesses. Learn about real-world attack vectors including unauthenticated cloud APIs, unsigned firmware updates, hardcoded root credentials, and vendor-enabled kill switches that plague today's solar infrastructure. Explore practical demonstrations of account takeover techniques using brute-forced PINs, remote access to power dashboards with zero authentication requirements, firmware tampering methods for establishing persistent implants, and replay attacks targeting plaintext MODBUS communications. Understand how security flaws propagate across rebadged OEM devices and shared cloud infrastructure, transforming individual vulnerabilities into industry-wide risks that affect the entire solar supply chain. Examine the gap between the promise of energy independence and the reality of insecure firmware, exposed APIs, and devices that communicate with unknown servers, fundamentally challenging assumptions about off-grid security and revealing why solar energy systems require a complete threat model reassessment.
Syllabus
DEF CON 33 - Rebadged, Relabeled, Rooted: Pwnage via Solar Supply Chain - Anthony Rose, Jake Krasnov
Taught by
DEFCONConference