Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Understanding HL7 2.X Standards - Pen Testing - and Defending HL7 2.X Messages

Black Hat via YouTube

Overview

Dive into the world of healthcare data security with this 46-minute Black Hat conference talk by Anirudh Duggal. Explore the intricacies of Health Level-7 (HL7) 2.X standards, their significance in healthcare data transfer, and the potential vulnerabilities in their implementation. Gain insights into pen testing medical systems running HL7 interfaces, including EMR software, patient monitors, and X-ray machines. Discover common flaws and attack surfaces in devices using HL7 2.X messages. Learn about the risks associated with unsecured HL7 implementations, including unauthorized access to patient information, architecture fingerprinting, diagnosis manipulation, and potential financial scams. Understand the challenges faced by hospitals and vendors in fully grasping the risks to their infrastructure. Explore strategies for defending HL7 2.X messages and improving the resilience of medical devices against potential attacks.

Syllabus

Understanding HL7 2.X Standards, Pen Testing, and Defending HL7 2.X Messages

Taught by

Black Hat

Reviews

Start your review of Understanding HL7 2.X Standards - Pen Testing - and Defending HL7 2.X Messages

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.