Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Zero-Touch-Pwn - Abusing Zoom's Zero Touch Provisioning for Remote Attacks on Desk Phones

Black Hat via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a critical security analysis of Zoom's "Zero Touch Provisioning" method in this 31-minute Black Hat conference talk. Delve into the vulnerabilities of cloud communication platforms when integrated with traditional endpoints like desk phones and analog gateways. Discover how centralized configurations and firmware in provisioning services can be exploited for remote attacks. Learn about the potential risks associated with certified hardware in Zoom's ecosystem. Gain insights into the intersection of modern cloud communication and legacy hardware, and understand the implications for organizational security. Presented by Moritz Abrell, this talk offers valuable information for cybersecurity professionals, IT administrators, and anyone involved in implementing or managing cloud communication systems.

Syllabus

Zero-Touch-Pwn: Abusing Zoom's Zero Touch Provisioning for Remote Attacks on Desk Phones

Taught by

Black Hat

Reviews

Start your review of Zero-Touch-Pwn - Abusing Zoom's Zero Touch Provisioning for Remote Attacks on Desk Phones

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.