10.08.2015 Views

EXPLOITING EMBEDDED SYSTEMS THE SEQUEL!

Exploitation - CanSecWest

Exploitation - CanSecWest

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Locating VulnerabilitiesRouter attack points:• Wireless – use lorcon library for injecting packets• External interface (IDS, tcp stack)• LAN side (UPNP, web server, etc)• Vulnerabilities that are near-dead in the PC realm, are abundant• Check malloc returns! ☺Party like it’s 1999!Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 28

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!