Overview
This course teaches learners about the security vulnerabilities in fax machines and how to exploit them. By the end of the course, students will be able to identify and exploit security flaws in fax machines, understand debugging techniques for hardware, and learn about specific vulnerabilities such as CVE-2018-5924 and CVE-2018-5925. The teaching method involves a combination of theoretical explanations and practical demonstrations. This course is intended for cybersecurity professionals, ethical hackers, and individuals interested in learning about cybersecurity vulnerabilities in fax technology.
Syllabus
Intro
FAXHistory
Back To The Future
The Security View
FAXAttack
How can we Debug it?
Breaking HW
Sections
WhatISThis?!
Let's Take A Look
APattern?!
DifferentAngle
The MissingLink
Softdisk
TheUndebuggable
Lucky Break
Debugging Challenges
Scout
Vulnerability
JPEG
Mitigation Bypass
CVE-2018-5924 CVE-2018-5925
Conclusions
Taught by
Cooper