I’d like to mention again that even though I’m presenting on this topic at other security conferences like HITB, the content is derived from ongoing security evaluations. Thus, each presentation will include new content and new vulnerabilities released, with the goal of building on the previous presentation.In the security world, attacker physical access means game over; so what happens if you can’t trust your electronic door system? This presentation and paper explore attack surfaces and exploitation vectors in a major vendor of electronic door access controllers (EDAC). The main focus is on time-constrained rapid analysis and bug-hunting methodologies applicable to a variety of embedded devices, with additional focus on research techniques that assist in locating and targeting EDAC systems. Rounding out the presentation is a review of practical countermeasures and potential research activities in the EDAC space. Attendees can expect an eye-opening experience regarding the insecurities of critical systems controlling physical access to environments like hospitals, schools, fire stations, businesses, etc.
Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.
Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.