Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using helpme@yg.ht Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
…
continue reading
Most people think of trains and railways as being great big lumps of metal that (hopefully) whizz along long shiny tracks, but it turns out they are incredibly complex and have a broad attack surface! Email Felix using helpme@yg.ht Find You Gotta Hack That on X @gotta_hackPar You Gotta Hack That
…
continue reading
1
Vulnerability research into SolaX Inverter Smart Connectivity
15:37
15:37
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
15:37
Felix describes research completed against the SolaX Pocket WiFi module that connects SolaX inverters to the Internet for smart connectivity features. The research highlights some of the challenges experienced by researchers and developers alike as well as the risks that these vulnerabilities present. Email Felix using helpme@yg.ht Find You Gotta H…
…
continue reading
In this episode Felix looks at the complexities and attack surface of modern cars. They may have become more sophisticated but are they now technologically fragile? Email Felix using helpme@yg.ht Find You Gotta Hack That on X @gotta_hackPar You Gotta Hack That
…
continue reading
Felix analyses the security within modern smart-prosthetics and medical tech to help prevent the need for amputations. The security need behind these two devices is not always immediately apparent because some people might think of it as being 'boring medical data'. Cyber security concerns are still there none-the-less, just in a slightly different…
…
continue reading
Felix delves in the technology that supports MRI scanners, X-Ray machines and CT scanners and looks at the vulnerabilities they have had in the past as well as potential opportunities for them to fall foul of attackers. The technology here focuses on the DICOM and HL7 protocols both of which have had security concerns but are used globally to ensur…
…
continue reading
Wearable tech is increasingly popular with consumers worldwide. It's become a class of tech that is so ubiquitous that privacy and cyber security concerns have to be taken seriously. In this episode we look at the Bluetooth Low Energy (BLE) protocol which makes the vast majority of this technology possible. Email Felix using helpme@yg.ht Find You G…
…
continue reading
1
Continuous Glucose Monitors (CGMs)
15:22
15:22
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
15:22
In this episode Felix investigates Glucose Monitors. He looks at their cyber security profile and discusses Near Field Communications (NFC) which is a commonly used protocol to communicate between smart phones and the little device. Email Felix using helpme@yg.ht Find You Gotta Hack That on Twitter @gotta_hack…
…
continue reading
Felix looks at the slightly murky history of the cyber security behind insulin pumps. These devices have a bad security reputation, but, it isn't that straight forward. Email Felix using helpme@yg.ht Find You Gotta Hack That on Twitter @gotta_hackPar You Gotta Hack That
…
continue reading
Pacemakers are surprising prevalent and have been around for years. These devices keep people alive but have a difficult cyber security history. Felix looks at how these devices work and what security challenges they face. Email Felix using helpme@yg.ht Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com…
…
continue reading
1
The IoT and embedded systems penetration testing process
25:44
25:44
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
25:44
Felix discusses what makes a good penetration testing process, the difficulties that are unique to the Internet of Things and embedded systems, and how best to approach getting good security assurance. Email Felix using helpme@yg.ht Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com…
…
continue reading
CCTV systems have a bad reputation when it comes to cyber security. Felix looks at the attack surface of CCTV systems and discusses how these systems are more complex than most people realise and how that results in them being abused. Email Felix using helpme@yg.ht Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com…
…
continue reading
Felix looks at the types of Occupancy Sensors typically used in lighting management and intruder alarm systems. The most common sensor type is the Passive Infra Red (PIR) sensors. These are primitive in some ways but very sophisticated in others. Email Felix using helpme@yg.ht Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com…
…
continue reading
1
Fire detection and response systems
13:42
13:42
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
13:42
Felix looks in depth at the cyber security implications of fire systems in modern buildings. This particularly focuses on the BACnet protocol - a common element of modern open-protocol systems. Email Felix using helpme@yg.ht Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.comPar You Gotta Hack That
…
continue reading
1
Lifts (Elevators) and Escalators
20:06
20:06
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
20:06
It is easy to take lifts and escalators for granted, but it turns out that modern versions have a huge amount of connectivity. We delve into all this tech and focus on one type of communications used in modern lilfts and escaltors, called ModBus. We discuss how ModBus might be attacked, especially when thinking about all the other technologies that…
…
continue reading
Felix delves into RFID door locks and examines a small portion of the cyber security issues in this space. Email Felix using helpme@yg.ht Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.comPar You Gotta Hack That
…
continue reading
1
Building Management Systems
14:58
14:58
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
14:58
We take a look at how Building Management Systems (BMS) are setup and the huge range of cyber security issues that can be present. Email Felix using helpme@yg.ht Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.comPar You Gotta Hack That
…
continue reading
Felix opens two smart plugs and discusses the security of what he finds. This continues the theme from previous episodes of electricity generation, management, and usage to show how many different angles an attacker could choose to affect our day-to-day lives. Email Felix using helpme@yg.ht Find You Gotta Hack That on Twitter @gotta_hack yougottaha…
…
continue reading
1
Delayed attacks against Realtek chips you'll find everywhere
16:06
16:06
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
16:06
Felix discusses the supply chain issues that allow attackers to take their time when taking advantage of embedded systems. The vulnerabilities discussed are for the Realtek RTL819xD chip and have IDs CVE-2021-35392, CVE-2021-35393, CVE-2021-35394, and CVE-2021-35395. Email Felix using helpme@yg.ht Find You Gotta Hack That on Twitter @gotta_hack you…
…
continue reading
1
Domestic Solar Power Systems
15:14
15:14
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
15:14
Felix looks at the system that supports the solar panels at home and where it might be weak to cyber attack. Warning though, don't play with electrics unless you know what you are doing! Email Felix using helpme@yg.ht Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.comPar You Gotta Hack That
…
continue reading
Par You Gotta Hack That
…
continue reading
Welcome to You Gotta Hack That, a brand new show in which Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area.Par You Gotta Hack That
…
continue reading