«
Expand/Collapse
65 items tagged "smart"
Related tags:
txt [+],
sql injection [+],
tony flick tags [+],
security [+],
flick [+],
video [+],
cisco security advisory [+],
cisco security [+],
cisco ios [+],
audio [+],
vision design [+],
vision [+],
smart vision [+],
power [+],
meter [+],
hacking [+],
zage [+],
wayne zage [+],
wardriving [+],
tags hardware [+],
smart project [+],
shawn moyer [+],
security vulnerabilities [+],
scada systems [+],
scada [+],
protocol application [+],
packet radios [+],
nathan keltner [+],
moyer [+],
meter maids [+],
keltner [+],
jonathan pollet [+],
joe cicero tags [+],
jacob appelbaum [+],
install [+],
grid [+],
free software updates [+],
drupal [+],
dolores zage [+],
cross site scripting [+],
cisco ios software [+],
chris tarnovsky [+],
card [+],
breadcrumb [+],
version [+],
texas [+],
survey [+],
sslsmart [+],
ssl [+],
social [+],
smartpc [+],
smart security [+],
smart pc [+],
smart communication [+],
smart card [+],
samsung [+],
protocols [+],
plugs [+],
phone [+],
pc recorder [+],
opensc [+],
multiple buffer overflow [+],
morehouse [+],
justin morehouse [+],
joe cummins [+],
inclusion [+],
houston [+],
hacks [+],
hack [+],
globecom [+],
eset [+],
directory traversal [+],
design [+],
communication protocols [+],
communication [+],
cipher [+],
buffer overflow vulnerabilities [+],
blog [+],
asp [+],
advisory [+],
abu dhabi [+],
Software [+],
wide [+],
web applications [+],
web [+],
vulnerabilities [+],
usa [+],
track [+],
targeting [+],
tags [+],
system [+],
synchronization [+],
storageworks modular smart array [+],
storageworks [+],
sophisticated systems [+],
smart tvs [+],
smart tv [+],
smart power [+],
smart phones [+],
smart phone [+],
smart meters [+],
smart info [+],
smart flash [+],
smart community [+],
smart cities [+],
smart card security [+],
slides [+],
service vulnerability [+],
security flaws [+],
security experts [+],
security authors [+],
rioters [+],
report [+],
project [+],
powermeter [+],
potential security vulnerability [+],
portal [+],
poc [+],
php poll [+],
phone security [+],
parsing [+],
parking [+],
paper [+],
own operating system [+],
operating [+],
modular [+],
meters [+],
metasploit [+],
max [+],
marc witteman [+],
maker [+],
lzh [+],
linux crowd [+],
interference [+],
info [+],
hp storageworks [+],
grid software [+],
green [+],
graham auld [+],
get smart [+],
garage door opener [+],
flash synchronization [+],
finds [+],
file upload [+],
external interface [+],
exploits [+],
douran [+],
dolphin [+],
distribution of electric power [+],
digital [+],
denial of service [+],
day [+],
code execution [+],
cms [+],
circuit [+],
cctv [+],
cameras [+],
bugtraq [+],
buffer overflow vulnerability [+],
black hat [+],
attack [+],
application [+],
Community [+],
vulnerability [+]
-
-
20:55
»
Packet Storm Security Advisories
Cisco Security Advisory - Cisco IOS Software contains a vulnerability in the Smart Install feature that could allow an unauthenticated, remote attacker to cause a reload of an affected device if the Smart Install feature is enabled. The vulnerability is triggered when an affected device processes a malformed Smart Install message on TCP port 4786. Cisco has released free software updates that address this vulnerability. There are no workarounds to mitigate this vulnerability.
-
20:55
»
Packet Storm Security Recent Files
Cisco Security Advisory - Cisco IOS Software contains a vulnerability in the Smart Install feature that could allow an unauthenticated, remote attacker to cause a reload of an affected device if the Smart Install feature is enabled. The vulnerability is triggered when an affected device processes a malformed Smart Install message on TCP port 4786. Cisco has released free software updates that address this vulnerability. There are no workarounds to mitigate this vulnerability.
-
20:55
»
Packet Storm Security Misc. Files
Cisco Security Advisory - Cisco IOS Software contains a vulnerability in the Smart Install feature that could allow an unauthenticated, remote attacker to cause a reload of an affected device if the Smart Install feature is enabled. The vulnerability is triggered when an affected device processes a malformed Smart Install message on TCP port 4786. Cisco has released free software updates that address this vulnerability. There are no workarounds to mitigate this vulnerability.
-
-
11:19
»
SecDocs
Authors:
Jonathan Pollet Tags:
SCADA Event:
Black Hat USA 2010 Abstract: SCADA Systems control the generation, transmission, and distribution of electric power, and Smart Meters are now being installed to measure and report on the usage of power. While these systems have in the past been mostly isolated systems, with little if no connectivity to external networks, there are many business and consumer issuing driving both of these technologies to being opened to external networks and the Internet. Over the past 10 years, we have performed over 100 security assessments on SCADA, EMS, DCS, AMI, and Smart Grid systems. We have compiled very interesting statistics regarding where the vulnerabilities in these systems are typically found, and how these vulnerabilities can be exploited. Of course, we can not disclose any specific exploits that will allow you to steal power from your neighbors, but we can give away enough meat in this session to expose common vulnerabilities at the device, protocol, application, host, and network layers.
-
-
7:36
»
Packet Storm Security Misc. Files
Whitepaper called Using QR Tags to Attack Smart Phones (Attaging). It discusses the threatscape related to arbitrary scanning of these tags and using Metasploit to exploit them.
-
-
19:01
»
Packet Storm Security Recent Files
The Smart Communication Protocols and Algorithms (SCPA 2011) Call For Papers has been announced. It will take place December 5th through the 9th, 2011 in Houston, Texas in conjunction with Globecom 2011.
-
19:01
»
Packet Storm Security Misc. Files
The Smart Communication Protocols and Algorithms (SCPA 2011) Call For Papers has been announced. It will take place December 5th through the 9th, 2011 in Houston, Texas in conjunction with Globecom 2011.
-
-
21:25
»
SecDocs
Authors:
Joe Cummins Jonathan Pollet Tags:
SCADA Event:
Black Hat Abu Dhabi 2010 Abstract: SCADA Systems control the generation, transmission, and distribution of electric power, and Smart Meters are now being installed to measure and report on the usage of power. While these systems have in the past been mostly isolated systems, with little if no connectivity to external networks, there are many business and consumer issuing driving both of these technologies to being opened to external networks and the Internet. Over the past 10 years, we have performed over 100 security assessments on SCADA, EMS, DCS, AMI, and Smart Grid systems. We have compiled very interesting statistics regarding where the vulnerabilities in these systems are typically found, and how these vulnerabilities can be exploited. Of course, we can not disclose any specific exploits that will allow you to steal power from your neighbors, but we can give away enough meat in this session to expose common vulnerabilities at the device, protocol, application, host, and network layers.
-
21:25
»
SecDocs
Authors:
Joe Cummins Jonathan Pollet Tags:
SCADA Event:
Black Hat Abu Dhabi 2010 Abstract: SCADA Systems control the generation, transmission, and distribution of electric power, and Smart Meters are now being installed to measure and report on the usage of power. While these systems have in the past been mostly isolated systems, with little if no connectivity to external networks, there are many business and consumer issuing driving both of these technologies to being opened to external networks and the Internet. Over the past 10 years, we have performed over 100 security assessments on SCADA, EMS, DCS, AMI, and Smart Grid systems. We have compiled very interesting statistics regarding where the vulnerabilities in these systems are typically found, and how these vulnerabilities can be exploited. Of course, we can not disclose any specific exploits that will allow you to steal power from your neighbors, but we can give away enough meat in this session to expose common vulnerabilities at the device, protocol, application, host, and network layers.
-
-
10:26
»
SecDocs
-
10:22
»
SecDocs
-
10:13
»
SecDocs
-
-
21:25
»
SecDocs
-
21:25
»
SecDocs
-
21:25
»
SecDocs
-
11:40
»
SecDocs
-
-
21:25
»
SecDocs
-
-
14:20
»
SecuriTeam
A potential security vulnerability has been identified with HP StorageWorks Modular Smart Array P2000 G3.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
14:00
»
Hack a Day
[Graham Auld] got his hands on an energy monitor for free from his utility company. The device seen in the insert provides a nice LCD display but he wanted a way to graph the data over time. There was an included cable and a method of using Google PowerMeter but only for Windows computers. He [...]
-
-
10:01
»
Hack a Day
[Max] designed this circuit to add smart flash synchronization to his photography arsenal. He did this because ‘dumb’ TTL based flashes won’t play nicely with more sophisticated systems like the Nikon Advanced Wireless Lighting. By building a microcontroller into the mechanism, he’s added functionality for several different scenarios, ensuring that he’ll never again have problems [...]