Arm IDA and Cross Check Reversing the Boeing 787's Core Network

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=WTCKoWtcuXs



Duration: 50:35
18 views
0


Ruben Santamarta | Principal Security Consultant, IOActive
Location: Lagoon GHI
Date: Wednesday, August 7 | 4:00pm-4:50pm
Format: 50-Minute Briefings
Tracks: Reverse Engineering, Hardware/Embedded

In 2008 the FAA issued several Special Conditions for The Boeing 787 Dreamliner. There were serious safety and security concerns about the brand-new network design Boeing had implemented, which provided the Dreamliner with some "e-enabled" capabilities never seen before.

This scenario raised some alarms in certain security circles that eventually faded out.

10 years later, this talk will provide the first public analysis of the Boeing 787's Core Network, revealing previously unknown vulnerabilities that would allow an attacker to compromise the security of the original design. The talk will also elaborate on the additional implications of these security flaws.

Black Hat - USA - 2019 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-01-07Exploiting Qualcomm WLAN and Modem Over The Air
2022-01-07I'm Unique, Just Like You: Human Side-Channels and Their Implications for Security and Privacy
2022-01-07All the 4G Modules Could be Hacked!
2022-01-07Exploiting the Hyper V IDE Emulator to Escape the Virtual Machine
2022-01-07Infighting Among Russian Security Services in the Cyber Sphere
2022-01-07All Your Apple are Belong to Us: Unique Identification and Cross-Device Tracking of Apple Devices
2022-01-07Exploring the New World : Remote Exploitation of SQLite and Curl
2022-01-07Firmware Cartography: Charting the Course for Modern Server Compromise
2022-01-07API-Induced SSRF: How Apple Pay Scattered Vulnerabilities Across the Web
2022-01-07Fantastic Red-Team Attacks and How to Find Them
2022-01-07Arm IDA and Cross Check Reversing the Boeing 787's Core Network
2022-01-07Finding a Needle in an Encrypted Haystack: Detect the Most Prevalent Attacks on Active Directory
2022-01-07Flying a False Flag: Advanced C2, Trust Conflicts, and Domain Takeover
2022-01-07Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD)
2022-01-07GDPArrrrr: Using Privacy Laws to Steal Identities
2022-01-07Finding Our Path: How We're Trying to Improve Active Directory Security
2022-01-07Ghidra - Journey from Classified NSA Tool to Open Source
2022-01-07Bounty Operations: Best Practices and Common Pitfalls to Avoid in the First 6-12 Months
2022-01-07Attacking Electric Motors for Fun and Profit
2022-01-07Death to the IOC What's Next in Threat Intelligence
2022-01-07Going Beyond Coverage-Guided Fuzzing with Structured Fuzzing



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
network
fraud
malware
secure
identity
access
safety
theft
system
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering
Ruben Santamarta
reversing
boeing
787
core network
FAA