Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on Jul 28, 2014
This presentation is meant to encourage individuals to put the applications and software that they may use on their own home or small business networks under the research microscope. This is will be a discussion of a recent independent research project that eventually lead to an information disclosure vulnerability by a major U.S. ISP. This is also an example of when a coordinated disclosure goes right.
What began with simple curiosity into the inner workings of an application lead to the ability to list wireless network names and wireless encryption keys (among other things) armed only with a WAN IP address. ************ Presented at RVAsec 2014: http://rvasec.com/