AI Product Expert Certification - Master Generative AI Skills
The Most Addictive Python and SQL Courses
Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore over 50 real-world IoT vulnerability cases in this 20-minute conference talk that exposes critical security flaws in the Internet of Things ecosystem. Discover systemic issues including vendor-embedded backdoors, predictable credentials, and exploitable configuration consoles through detailed analysis of high-severity vulnerabilities like CVE-2024-48271 (CVSS 9.8) and CVE-2025-1143, which are actively exploited by APT groups and scammers for remote code execution and global device control. Learn how even novice attackers can compromise critical infrastructure including ATMs and water treatment facilities by targeting poorly secured IoT devices. Gain insights into the frustrating realities of vulnerability disclosure processes, including stories of ignored reports, year-long delays, and manufacturer denials despite severe security risks when reporting to CNAs and CERTs. Acquire actionable knowledge about vulnerability discovery techniques, secure development practices, and responsible disclosure processes that will benefit hackers, developers, and manufacturers working to strengthen IoT security across critical infrastructure and consumer devices.
Syllabus
DEF CON 33 - Unveiling IoT Vulns: From Backdoors to Bureaucracy - Kai-Ching Wang, Chiao-Lin Yu
Taught by
DEFCONConference