♫musicjinni

DEF CON 22 - Cesar Cerrudo - Hacking US (and UK, Australia, France, etc.) traffic control systems

video thumbnail
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Cerrudo/DEFCON-22-Cesar-Cerrudo-Hacking-Traffic-Control-Systems-UPDATED.pdf

Hacking US (and UK, Australia, France, etc.) traffic control systems
Cesar Cerrudo CTO, IOACTIVE LABS
Probably many of us have seen that scene from "Live Free or Die Hard" (Die Hard 4) were the "terrorist hackers" manipulate traffic signals by just hitting Enter key or typing a few keys, I wanted to do that! so I started to look around and of course I couldn't get to do the same, that's too Hollywood style! but I got pretty close. I found some interesting devices used by traffic control systems on important cities such as Washington DC, Seattle, New York, San Francisco, Los Angeles, etc. and I could hack them :) I also found that these devices are also used in cities from UK, France, Australia, China, etc. making them even more interesting. This presentation will tell the whole story from how the devices were acquired, the research, on site testing demos (at Seattle, New York and Washington DC), vulnerabilities found and how they can be exploited, and finally some possible NSA style attacks (or should I say cyberwar style attacks?) Oh, I almost forgot, after this presentation anyone will be able to hack these devices and mess traffic control systems since there is no patch available (sorry didn't want to say 0day ;)) I hope that after this I still be allowed to enter (or leave?) the US

Cesar Cerrudo is CTO at IOActive Labs where he leads the team in producing ongoing cutting edge research in the areas of SCADA, mobile device, application security and more. Formerly the founder and CEO of Argeniss Consulting, acquired by IOActive, Cesar is a world renown security researcher and specialist in application security.

Throughout his career, Cesar is credited with discovering and helping to eliminate dozens of vulnerabilities in leading applications including Microsoft SQL Server, Oracle database server, IBM DB2, Microsoft BizTalk Server, Microsoft Commerce Server, Microsoft Windows, Yahoo! Messenger, etc. In addition, Cesar has authored several white papers on database, application security, attacks and exploitation techniques and he has been invited to present at a variety of companies and conferences including Microsoft, Black Hat, Bellua, CanSecWest, EuSecWest, WebSec, HITB, Microsoft BlueHat, EkoParty, FRHACK, H2HC, Defcon, Infiltrate, etc. Cesar collaborates with and is regularly quoted in print and online publications including eWeek, ComputerWorld, and other leading journals.

Twitter: @cesarcer

DEF CON 22 - Cesar Cerrudo - Hacking US (and UK, Australia, France, etc.) traffic control systems

DEF CON 22 - Deviant Ollam & Howard Payne - Elevator Hacking - From the Pit to the Penthouse

DEF CON 22 - Glenn Wilkinson - Practical Aerial Hacking & Surveillance

DEF CON 22 - Panel - DEF CON the Mystery, Myth, and Legend

DEF CON 22 - Nemus - An Introduction to Back Dooring Operating Systems for Fun and Trolling

DEF CON 22 - Metacortex and Grifter - Touring the Darkside of the Internet. An Introduction to Tor

DEF CON 22 - Tim Strazzere and Jon Sawyer - Android Hacker Protection Level 0

DEF CON 22 - Chris Littlebury - Home Alone with localhost: Automating Home Defense

DEF CON 22 - Brent White - Corporate Espionage

DEF CON 22 - Zoltán Balázs - Bypass firewalls, application white lists...

DEF CON 22 - Major Malfunction - Old Skewl Hacking - Porn Free!

DEF CON 22 - Keren Elazari - Empowering Hackers to Create a Positive Impact

DEF CON 22 - Jason Healey - Saving the Internet (for the Future)

DEF CON 22 - Dameff, Tully, and Hefley - Hacking 911: Adventures in Disruption, Destruction & Death

DEF CON 22 - Ladar Levison and Stephen Watt - Dark Mail

DEF CON 22 - Ryan Noah Shapiro - Hacking the FBI - How & Why to Liberate Government Records

DEF CON 22 - Jim Denaro and Tod Beardsley - How to Disclose an Exploit Without Getting in Trouble

DEF CON 22 - Grant Bugher - Detecting Bluetooth Surveillance Systems

DEF CON 22 - Blake Self and Shawn "cisc0ninja" Burrell - Don't DDoS Me Bro: Practical DDoS Defense

DEF CON 22 - Dominic White and Ian de Villiers - Manna from Heaven

DEF CON 22 - Gene Bransfield - Weaponizing Your Pets: The War Kitteh and the Denial of Service Dog

DEF CON 22 - Christopher Soghoian - Blinding The Surveillance State

DEF CON 22 - Paul Such 0x222 and Agix - Playing with Car Firmware or How to Brick your Car

DEF CON 22 - Charlie Miller & Chris Valasek - A Survey of Remote Automotive Attack Surfaces

DEF CON 22 - Anch - The Monkey in the Middle: A pentesters guide to playing in traffic.

DEF CON 22 - Ryan Kazanciyan and Matt Hastings, Investigating PowerShell Attacks

DEF CON 22 - Weston Hecker - Burner Phone DDOS 2 dollars a day : 70 Calls a Minute

DEF CON 22 - Panel- Ephemeral Communications: Why and How?

DEF CON 22 - Brian Gorenc and Matt Molinyawe - Building Your Own SMS/MMS Fuzzer

DEF CON 22 - Eijah - Saving Cyberspace by Reinventing File Sharing

Disclaimer DMCA