HACKING IoT A Case Study on Baby Monitor Exposures and Vulnerabilities
RL2Fq
RL2Fq
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Disclosure Timeline<br />
Sat, Jul 04, 2015: Initial c<strong>on</strong>tact<br />
to vendor<br />
M<strong>on</strong>, Jul 06, 2015: Vendor reply, details<br />
disclosed to vendor<br />
Sun, Jul 16, 2015: Clarificati<strong>on</strong> sought<br />
by vendor<br />
M<strong>on</strong>, Jul 20, 2015: Clarificati<strong>on</strong> provided<br />
to vendor<br />
Tue, Jul 21, 2015: Disclosure to CERT<br />
Wed, Sep 02, 2015: Public disclosure<br />
5 <br />
http://www.ifc0nfig.com/a-close-lookat-the-philips-in-sight-ip-camerarange/<br />
6 <br />
http://www.weaved.com/<br />
7 <br />
https://www.yoics.net<br />
8 <br />
http://www.mysnapcam.com/<br />
| Rapid7.com Hacking <str<strong>on</strong>g>IoT</str<strong>on</strong>g>: A <str<strong>on</strong>g>Case</str<strong>on</strong>g> <str<strong>on</strong>g>Study</str<strong>on</strong>g> <strong>on</strong> <strong>Baby</strong> M<strong>on</strong>itor <strong>Exposures</strong> <strong>and</strong> <strong>Vulnerabilities</strong> 13