Home
Explore
Submit Search
Upload
Login
Signup
Advertisement
Check these out next
Drupalgeddon 2 – Yet Another Weapon for the Attacker
DefCamp
Economical Denial of Sustainability in the Cloud (EDOS)
DefCamp
Trust, but verify – Bypassing MFA
DefCamp
Threat Hunting: From Platitudes to Practical Application
DefCamp
Building application security with 0 money down
DefCamp
Implementation of information security techniques on modern android based Kio...
DefCamp
Lattice based Merkle for post-quantum epoch
DefCamp
The challenge of building a secure and safe digital environment in healthcare
DefCamp
1
of
20
Top clipped slide
Critical vulnerabilities in the online services of a romanian telephony company - DefCamp 2012
Dec. 17, 2012
•
0 likes
0 likes
×
Be the first to like this
Show More
•
667 views
views
×
Total views
0
On Slideshare
0
From embeds
0
Number of embeds
0
Download Now
Download to read offline
Report
DefCamp
Follow
DefCamp
Advertisement
Advertisement
Advertisement
Recommended
Repair or replace
Abie Anarna
536 views
•
11 slides
KT Value Proposition PowerPoint Presentation Slides
SlideTeam
51 views
•
19 slides
Remote Yacht Hacking
DefCamp
1.7K views
•
89 slides
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
DefCamp
970 views
•
167 slides
The Charter of Trust
DefCamp
542 views
•
24 slides
Internet Balkanization: Why Are We Raising Borders Online?
DefCamp
306 views
•
22 slides
More Related Content
More from DefCamp
(20)
Drupalgeddon 2 – Yet Another Weapon for the Attacker
DefCamp
•
268 views
Economical Denial of Sustainability in the Cloud (EDOS)
DefCamp
•
250 views
Trust, but verify – Bypassing MFA
DefCamp
•
315 views
Threat Hunting: From Platitudes to Practical Application
DefCamp
•
217 views
Building application security with 0 money down
DefCamp
•
175 views
Implementation of information security techniques on modern android based Kio...
DefCamp
•
213 views
Lattice based Merkle for post-quantum epoch
DefCamp
•
238 views
The challenge of building a secure and safe digital environment in healthcare
DefCamp
•
323 views
Timing attacks against web applications: Are they still practical?
DefCamp
•
257 views
Tor .onions: The Good, The Rotten and The Misconfigured
DefCamp
•
804 views
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
DefCamp
•
291 views
We will charge you. How to [b]reach vendor’s network using EV charging station.
DefCamp
•
423 views
Connect & Inspire Cyber Security
DefCamp
•
289 views
The lions and the watering hole
DefCamp
•
219 views
Catch Me If You Can - Finding APTs in your network
DefCamp
•
298 views
WiFi practical hacking "Show me the passwords!"
DefCamp
•
1.6K views
OSSTMM: The “Measure, Don’t Guess” Security Testing Methodology
DefCamp
•
424 views
Open Directories: Sensitive data (not) hiding in plain sight
DefCamp
•
237 views
Year of the #WiFiCactus
DefCamp
•
294 views
How to Fuzz like a Hacker
DefCamp
•
236 views
Advertisement
Critical vulnerabilities in the online services of a romanian telephony company - DefCamp 2012
Vulnerabilități grave
în serviciile online ale unui telecom din România Prisăcaru Anatolie 01.12.2012 @shark0der @DefCamp
The problem
The motivation
Let's dive into
all this stuff
The configurator
The surprise
The serious approach
… still serious
approach
This can't be
real
What about pushing
the limits?
… even more
Unbelievable, but it
worked :)
Really worked!
And I've got
more then I expected!
Under the hood
The key
The simplicity
The stupidity
The lesson NEVER
BUT NEVER TRUST USER INPUT
THE END Prisăcaru Anatolie
01.12.2012 @shark0der @DefCamp
Advertisement