Discover@BEERISAC: OT/ICS Security Podcast PlaylistEP 52: Hacking Cellular-Enabled IoT Devices
EP 52: Hacking Cellular-Enabled IoT Devices

EP 52: Hacking Cellular-Enabled IoT Devices

Update: 2024-12-20
Share

Description

Podcast: Error Code (LS 27 · TOP 10% what is this?)
Episode: EP 52: Hacking Cellular-Enabled IoT Devices
Pub date: 2024-12-18

Get Podcast Transcript →
powered by Listen411 - fast audio-to-text and summarization



This is the story of the secret life of cellular chips and why we need to mitigate against the unintended access they provide. Deral Heiland, Principal Security Research for IoT at Rapid 7, describes a research project he presented at the IoT Village at DEF CON 32 where they compiled AT command manuals from various vendors, discovering unexpected functionalities, such as internal web services.



The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Comments 
loading
In Channel
loading
00:00
00:00
1.0x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

EP 52: Hacking Cellular-Enabled IoT Devices

EP 52: Hacking Cellular-Enabled IoT Devices

Robert Vamosi