Home / Series / Hackers of CypherCon / Aired Order / Season 2 / Episode 27

Journey to Command Injection with Rick Ramgattie

Sometimes, owning an embedded device takes multiple different vulnerabilities, creativity, and a little finesse. In this live demo, we show how we were able to chain multiple vulnerabilities in the Lenovo ix4-300d network attached storage device into a remote exploit that can be executed with little user interaction.

English
  • Originally Aired March 27, 2020
  • Runtime 27 minutes
  • Network Prime Video
  • Created August 27, 2020 by
    Administrator admin
  • Modified August 27, 2020 by
    Administrator admin