Hacking Satellite TV receivers : Are those IoT devices secure?

Size: px
Start display at page:

Download "Hacking Satellite TV receivers : Are those IoT devices secure?"

Transcription

1 Hacking Satellite TV receivers : Are those IoT devices secure? Sofiane Talmat Security Consultant

2 Agenda Introduction Many things going wrong Thank you

3 Why Satellite TV receivers?

4 What is this all about?

5 TV encryption scheme ECM : Entitlement Control Message EMM : Entitlement Management Message CW : Content encryption key This is what we are looking for

6 Scrambling ECM CW CAS EMM CAS: Conditional Access System ECM: Entitlement Control Message EMM: Entitlement Management Message CW: Control word Scrambler Scrambled Stream

7 Descrambling STB CAM CAM: Conditional Access Module STB: Set Top Box Smart Card Scrambled Stream EMM CW ECM Descrambler To TV

8 What made the difference? We used to have : Proprietary STBs One service provider per STB We now have : Open STBs Fully featured Linux boxes

9 Case study : Forever Nano Pro

10 Better than my graduation computer Forever Nano pro : ~150 USD Realtek RTL8201CP 10/100M STi7111 Mhz) 2x1 Gb DDR2 SDRAM Tuner 3.1 Services GL850G USB 2.0 Hub 1x2Gb NAND flash CORERIVER CICore 1.0

11 Recap STi7111 processor (St40 ROM=256MB RAM= 256MB 10/100M Ethernet port 2 USB 2.0 ports 1 card reader 2 module reader (CI) HDMI RCA SPDIF

12 Things getting easy

13 What could possibly go wrong?

14 What bring STBs to IoT?

15 What made the difference? We used to have : Proprietary STBs One service provider per STB We now have : Open STBs Fully featured Linux boxes

16 Attack evolution STB without CAS Software emulator STB + CAS Cloned smart cards CAM Card Sharing Protocol providers plugin Internet connectivity Satellite key sharing

17 Card sharing concept Card Server oscam, Internet ECM/EMM CW Client STB ccam mgcamd gbox

18 Components and Actors Root Provider Rseller Reseller End User End User End user End user Plugins Plugins Plugins Plugins

19 Components and Actors Root provider : Generally server hosted at home Reseller : Generate keys and provide/install plugin End user : Plugin running on STB Cardsharing plugins installed on STBs: cccam, mgcamd, newcamd, gbox, etc.: UNKNOWN origin

20 What could possibly go wrong?

21 Vulnerabilities?

22 Root account without password Any other users?

23 Rooting the devices

24 SH4 compiling options Install gcc for SH4: Thanks to cross compiling tools Qemu and SH4 debian image: SH4 vm stlinux

25

26 Everything runs as root Main processes

27 No firewall

28 Iptables config start() { echo Starting firewall: iptables. iptables-restore < /etc/firewall.conf } save() { iptables-save > /etc/firewall.conf } stop() { echo Stopping firewall: iptables. save }

29 FTP config

30 Network Activity

31 What could reversing FRior service Unauthenticated Check status, channel details, configure, View and set alarms View and edit service status Manage streaming to remote IP More, more, more,. Does it contain bugs? : YES

32 What could possibly go wrong?

33 System Updates

34 What about system update? Main firmware update Clear text protocol from internet No digital signature verification Plugins and applications Clear text from internet No digital signature

35 Updated to the latest firmware

36 However they do fix some bugs.

37 Miscellaneous

38 Internet connectivity support Integrated web browser No support for HTTPS IPTV plugins applications Remote SQL Injection

39 What could possibly go wrong?

40 Put all this together

41 Overview Internal Architecture and security Total Fail! Cardsharing plugins installed on STBs: cccam/mgcamd/newcamd/gbox : UNKNOWN DEVLOPERS and Untrusted Firmware upgrade and patching: Total Fail! Main Actors : Unknown, untraceable and untrusted

42 Number of devices Number of cards haring subscribers : ~ 4 Millions in Algeria only / what about the world? End user : Unaware

43 Manufacturers promoting card sharing Free access to card sharing server for 394 days

44 Contacting vendor

45 Building a botnet Building the plugin : Some C/C++ coding skills to build the plugin Thanks to cross compiling tools Hosting the service : Either host a card sharing server Or become a reseller Throw that on internet End users/resellers: They will come for you

46 Demo of a Backdoor

47 OOPS Something went wrong.

48 Thank you

How To Hack A Satellite Receiver For Profit On A Pc Or Ipad (For A Pb) For A Pk (For An Ipad) For Free (For Pc) For Your Computer) For The First Time (For Your Computer Or

How To Hack A Satellite Receiver For Profit On A Pc Or Ipad (For A Pb) For A Pk (For An Ipad) For Free (For Pc) For Your Computer) For The First Time (For Your Computer Or Subverting satellite receivers for botnet and profit Sofiane Talmat Senior Security Consultant Agenda The famous who am I? slide The quest for the Control Word A series of What could possibly go wrong?

More information

MOI DVB-S2 Streaming Box Quick Start Guide

MOI DVB-S2 Streaming Box Quick Start Guide MOI DVB-S2 Streaming Box Quick Start Guide V1.1 1 Contents 1. Overview 1.1. At A Glance 1.2. Specifications 1.3. System Requirements 1.4. Package 2. Hardware Connection 3. Software Installation and Configuration

More information

Monitoring Conditional Access Systems

Monitoring Conditional Access Systems Monitoring Conditional Access Systems Introduction A Conditional Access system is a key component for most digital TV operations. They secure the operators investments by encrypting the signals and ensures

More information

OfficeServ Application Suite

OfficeServ Application Suite OfficeServ Application Suite Introduction to the standard package The OfficeServ application suite consists of a number of applications designed to enhance the functionality and usability of the Samsung

More information

Ensure that the server where you install the Primary Server software meets the following requirements: Item Requirements Additional Details

Ensure that the server where you install the Primary Server software meets the following requirements: Item Requirements Additional Details ZENworks 11 SP3 System December 2014 The following sections provide the Novell ZENworks 11 SP3 requirements for hardware and software: Section 1, Primary Server, on page 1 Section 2, Managed Device, on

More information

Sistemi ad agenti Principi di programmazione di sistema

Sistemi ad agenti Principi di programmazione di sistema Sistemi ad agenti Principi di programmazione di sistema Modulo 6 Why would anyone want to hack or write opensource project for embedded system, when you already have a very powerful and relatively cheap

More information

OS Installation Guide Red Hat Linux 9.0

OS Installation Guide Red Hat Linux 9.0 OS Installation Guide Red Hat Linux 9.0 C o n t e n t s Contents 3 About This Guide 5 1 Planning Your Installation 7 Requirements 7 2 Installing Red Hat 9.0 Error! Bookmark not defined. What s Next? 19

More information

Automated Flashing and Testing for Continuous Integration

Automated Flashing and Testing for Continuous Integration Automated Flashing and Testing for Continuous Integration Igor Stoppa Embedded Linux Conference North America 2015 1 Automated Flasher Tester AFT Tool for deploying and verifying a SW image on an appropriate

More information

2014 Teradici Corporation.

2014 Teradici Corporation. VDI Client Comparison Thick, Thin, and PCoIP Zero Clients Agenda > Thick, Thin, and PCoIP Zero Clients > Repurposed PCs to Thin Clients > Thin Clients > PCoIP Zero Clients > Total Cost of Ownership Review

More information

Citrix XenServer 5.6 OpenSource Xen 2.6 on RHEL 5 OpenSource Xen 3.2 on Debian 5.0(Lenny)

Citrix XenServer 5.6 OpenSource Xen 2.6 on RHEL 5 OpenSource Xen 3.2 on Debian 5.0(Lenny) Installing and configuring Intelligent Power Protector On Xen Virtualized Architecture Citrix XenServer 5.6 OpenSource Xen 2.6 on RHEL 5 OpenSource Xen 3.2 on Debian 5.0(Lenny) 1 Introduction... 3 1. Citrix

More information

Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours

Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Introduction The following lab allows the trainee to obtain a more in depth knowledge of network security and

More information

Archives About ARCHOS TV+

Archives About ARCHOS TV+ About ARCHOS TV+ General Questions I have installed a firmware/plug-in/game file on my Archos TV+ but it is not recognized by the device. You may have not correctly copied your file on the device. If it

More information

Ignify ecommerce. Item Requirements Notes

Ignify ecommerce. Item Requirements Notes wwwignifycom Tel (888) IGNIFY5 sales@ignifycom Fax (408) 516-9006 Ignify ecommerce Server Configuration 1 Hardware Requirement (Minimum configuration) Item Requirements Notes Operating System Processor

More information

ATV310B User Manual. V1.1 www.mygica.es

ATV310B User Manual. V1.1 www.mygica.es ATV310B User Manual V1.1 www.mygica.es 1 Introduction Mygica ATV310B is a product connected to your TV via HDMI that turn your TV to a multifunction smart TV. It is a revolutionary entertainment on your

More information

Avaya TM G700 Media Gateway Security. White Paper

Avaya TM G700 Media Gateway Security. White Paper Avaya TM G700 Media Gateway Security White Paper March 2002 G700 Media Gateway Security Summary With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional

More information

Avaya G700 Media Gateway Security - Issue 1.0

Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise

More information

Embedded Operating Systems in a Point of Sale Environment. White Paper

Embedded Operating Systems in a Point of Sale Environment. White Paper Embedded Operating Systems in a Point of Sale Environment White Paper December 2008 Contents Embedded Operating Systems in a POS Environment... 3 Overview... 3 POS Operating Systems... 3 Operating Systems

More information

DVCrypt Conditional Access System

DVCrypt Conditional Access System DVCrypt Conditional Access System Quick start guide 1. Introduction DVCrypt is a conditional access system for digital TV broadcasting networks (DVB). It consists of hardware modules and client/server

More information

Avigilon Control Center Gateway User Guide

Avigilon Control Center Gateway User Guide Avigilon Control Center Gateway User Guide Version: 5.2 PDF-ACCGATEWAY5-B-Rev1 2013-2014 Avigilon Corporation. All rights reserved. Unless expressly granted in writing, no license is granted with respect

More information

SUN COBALT RaQ 4 Server Appliance FAQ

SUN COBALT RaQ 4 Server Appliance FAQ SUN COBALT RaQ 4 Server Appliance - Frequently Asked Questions THE SUN COBALT RAQ 4 IS ADVANCING SERVER APPLIANCE TECHNOLOGIES BY INTEGRATING THE MOST POWERFUL TOOLS AND APPLICATIONS INTO A RELIABLE, LOW-COST

More information

Higth definition from A to Z. www.azbox-hd.com

Higth definition from A to Z. www.azbox-hd.com Higth definition from A to Z www.azbox-hd.com Do you Feel the full HD multimedia? Wifi Web Browser Yes, you read this correctly. O2media present a new line of AzBox HD receivers, with the AzBox HD Elite

More information

EZCast Universal WiFi Display Dongle Quick Instal ation Guide Ver. 1.3

EZCast Universal WiFi Display Dongle Quick Instal ation Guide Ver. 1.3 EZCast Universal WiFi Display Dongle Quick Installation Guide Ver. 1.3 Thanks for using the amazing EZCast WiFi display dongle. This is the universal quick installation guide for Visonicom EZCast WiFi

More information

An affordable all-digital solution for cable systems of every size

An affordable all-digital solution for cable systems of every size Welcome the Digital Era with CONDOR Set-Top Box Platform & Headend Broadcast System An affordable all-digital solution for cable systems of every size www.picodigital.com Telephone: +1 (858) 546-5050 Toll

More information

Practice Management Installation Guide. Requirements/Prerequisites: Workstation Requirements. Page 1 of 5

Practice Management Installation Guide. Requirements/Prerequisites: Workstation Requirements. Page 1 of 5 Practice Management Installation Guide Your computers must meet the Workstation, Server and Network Requirements (see below for specifics). These requirements will ensure that Practice Management will

More information

Hosted SharePoint: Questions every provider should answer

Hosted SharePoint: Questions every provider should answer Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money

More information

Upgrade your Software

Upgrade your Software Video server software From time to time software upgrades are issued for the video servers. These are posted on our website www.ad-networkvideo.com or on the product CD and consist of two parts, the application

More information

TABLE OF CONTENTS NETWORK SECURITY 2...1

TABLE OF CONTENTS NETWORK SECURITY 2...1 Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

ClearOS Network, Gateway, Server Quick Start Guide

ClearOS Network, Gateway, Server Quick Start Guide ClearOS Network, Gateway, Server Quick Start Guide Welcome ClearOS is computer Operating System (OS) that provides enterprise-level network security and application services to the Small/Medium-sized Business

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Express

Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Express Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Express SQL 2008 R2 Express Restrictions 1 CPU 1 GB Ram Use Limit 10 GB Database Size High Availability Options None (No Database Mirroring,

More information

Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Standard

Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Standard Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Standard SQL 2008 R2 Standard Restrictions 4 CPU 64 GB Ram Use Limit 524 PB Database Size High Availability Options Limited Database Mirroring,

More information

Qualified Integrators and Resellers (QIR) Implementation Statement

Qualified Integrators and Resellers (QIR) Implementation Statement Qualified Integrators and Resellers (QIR) Implementation Statement For each Qualified Installation performed, the QIR Employee must complete this document and confirm whether the validated payment application

More information

Purpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption...

Purpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption... Contents Purpose... 3 Background on Keyscan Software... 3 Client... 4 Communication Service... 4 SQL Server 2012 Express... 4 Aurora Optional Software Modules... 5 Computer Hardware Configurations... 6

More information

Coolmax CN-590 Network Storage Solution

Coolmax CN-590 Network Storage Solution Coolmax CN-590 Network Storage Solution Model Name Controller hip CPU OS Memory Interface CN-590 S2892 150MHz RTOS 8MB SDRAM / 1MB NOR Flash LAN Standard 10/100Base-TX Auto MDI/MDI-X Connector Type RJ-45

More information

Servers, Clients. Displaying max. 60 cameras at the same time Recording max. 80 cameras Server-side VCA Desktop or rackmount form factor

Servers, Clients. Displaying max. 60 cameras at the same time Recording max. 80 cameras Server-side VCA Desktop or rackmount form factor Servers, Clients Displaying max. 60 cameras at the same time Recording max. 80 cameras Desktop or rackmount form factor IVR-40/40-DSKT Intellio standard server PC 60 60 Recording 60 cameras Video gateway

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

- Open Architecture/Interoperability Issues

- Open Architecture/Interoperability Issues Digital Set Top Box (STB) - Open Architecture/Interoperability Issues The DVB (Digital Video Broadcast) project group has developed a family of interrelated international standards for digital television

More information

HotelTV1. Client Software Update REV A0.6 D0202. 2014 October. Web : http://support.vestek.com.tr Mail : support@vestek.com.tr Tel : +90 212 286 01 06

HotelTV1. Client Software Update REV A0.6 D0202. 2014 October. Web : http://support.vestek.com.tr Mail : support@vestek.com.tr Tel : +90 212 286 01 06 D0202 HotelTV1 Client Software Update 2014 October 1. Revision History Date Owner Version Reason & Change 11 Oct 2011 Bora Tunçer A0.1 Initial creation 24 Jan 2012 Bora Tunçer A0.2 Adding bootloader update

More information

Ensim WEBppliance 3.0 for Windows (ServerXchange) Release Notes

Ensim WEBppliance 3.0 for Windows (ServerXchange) Release Notes Ensim WEBppliance 3.0 for Windows (ServerXchange) Release Notes May 07, 2002 Thank you for choosing Ensim WEBppliance 3.0 for Windows. This document includes information about the following: About Ensim

More information

Hardware/Software Requirements For Self-Hosting Multi Server

Hardware/Software Requirements For Self-Hosting Multi Server Hardware/Software Requirements For Self-Hosting Multi Server Ebix recommends two or more servers for sites with more than 20 active users. The first step is deciding which type of configuration would best

More information

Performance of Host Identity Protocol on Nokia Internet Tablet

Performance of Host Identity Protocol on Nokia Internet Tablet Performance of Host Identity Protocol on Nokia Internet Tablet Andrey Khurri Helsinki Institute for Information Technology HIP Research Group IETF 68 Prague March 23, 2007

More information

Remote Monitoring Unit SC8100. Monitoring Unit SC8100

Remote Monitoring Unit SC8100. Monitoring Unit SC8100 Monitoring Unit SC8100 Remote Monitoring Unit SC8100 Environmental monitoring of any facilities, control of security breaches, temperatures, smoke, water leakages, voltages and more. Compatible with all

More information

Introduction to Mobile Access Gateway Installation

Introduction to Mobile Access Gateway Installation Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure

More information

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Kaspersky Endpoint Security 10 for Windows. Deployment guide Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses

More information

Central Management System

Central Management System Central Management System Software Installation Guide Ver. 1.5.0.101115.001 ... ii System Introduction... 3 Client/Server Architecture...3 System Requirements... 4 System Setup...4 Multiple Monitor Configuration...5

More information

Hardening Guide. Installation Guide

Hardening Guide. Installation Guide Installation Guide About this Document The intended use of this guide is to harden devices and also provide collateral for deployment teams to deal with local network policy, configurations and specification.

More information

Digg Dekodere - HDPV-C20CXM - HD-C63CX

Digg Dekodere - HDPV-C20CXM - HD-C63CX Digg Dekodere - HDPV-C20CXM - HD-C63CX HD-C63CX - CAS : Conax Chipset pairing Middleware : Cubiware Raskt og enkelt brukergrensesnitt lineær TV programmering ( DVB-C ) On-demand og Pay-per-view (PPV) programmering

More information

What is WS_FTP? How WS_FTP Works

What is WS_FTP? How WS_FTP Works What is WS_FTP? WS_FTP is the leading file transfer client with millions of users worldwide. You can easily and securely transfer files between your home and office and to and from customers, clients,

More information

Virtually Secure. a journey from analysis to remote root 0day on an industry leading SSL-VPN appliance

Virtually Secure. a journey from analysis to remote root 0day on an industry leading SSL-VPN appliance Virtually Secure a journey from analysis to remote root 0day on an industry leading SSL-VPN appliance Who am I? Tal Zeltzer Independent security researcher from Israel Reverse engineering (mostly embedded

More information

Chapter 1 Hardware and Software Introductions of pcduino

Chapter 1 Hardware and Software Introductions of pcduino Chapter 1 Hardware and Software Introductions of pcduino pcduino is a high performance, cost effective mini PC platform that runs PC like OS such as Ubuntu Linux. It outputs its screen to HDMI enabled

More information

Using SonicWALL NetExtender to Access FTP Servers

Using SonicWALL NetExtender to Access FTP Servers SSL-VPN Using SonicWALL NetExtender to Access FTP Servers Problem: Using NetExtender to access an FTP Server on the LAN segment of a SonicWALL PRO 4060. Solution: Perform the following setup steps. Step

More information

FortiWeb 5.0, Web Application Firewall Course #251

FortiWeb 5.0, Web Application Firewall Course #251 FortiWeb 5.0, Web Application Firewall Course #251 Course Overview Through this 1-day instructor-led classroom or online virtual training, participants learn the basic configuration and administration

More information

SAMSUNG SMARTTV: HOW-TO TO CREATING INSECURE DEVICE IN TODAY S WORLD. Sergey Belov

SAMSUNG SMARTTV: HOW-TO TO CREATING INSECURE DEVICE IN TODAY S WORLD. Sergey Belov Sergey Belov # whoami Penetration tester @ Digital Security Bug hunter Speaker Agenda SmartTV - what is it? Current state of research (in the world) Samsung Smart TV - series 2008-2014 Emulator vs real

More information

CDH installation & Application Test Report

CDH installation & Application Test Report CDH installation & Application Test Report He Shouchun (SCUID: 00001008350, Email: she@scu.edu) Chapter 1. Prepare the virtual machine... 2 1.1 Download virtual machine software... 2 1.2 Plan the guest

More information

ANTIK JUICE IPTV DEMO KIT MANUAL

ANTIK JUICE IPTV DEMO KIT MANUAL ANTIK JUICE IPTV DEMO KIT MANUAL Thank you for purchasing the Juice IPTV Demo Kit (IDK). We have put together the Juice IDK to offer our client a good insight about IPTV, and to give you a hand-on experience

More information

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.

More information

Checkmate 5.5 Self Hosted Quick Start Guide

Checkmate 5.5 Self Hosted Quick Start Guide Checkmate 5.5 Self Hosted Quick Start Guide Introduction Checkmate 5.5 offers a new web interface allowing all users in your environment to seamlessly access all of Checkmate s features by connecting to

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent

More information

Yun Shield User Manual VERSION: 1.0. Yun Shield User Manual 1 / 22. www.dragino.com

Yun Shield User Manual VERSION: 1.0. Yun Shield User Manual 1 / 22. www.dragino.com Yun Shield User Manual VERSION: 1.0 Version Description Date 0.1 Initiate 2014-Jun-21 1.0 Release 2014-Jul-08 Yun Shield User Manual 1 / 22 Index: 1 Introduction... 3 1.1 What is Yun Shield... 3 1.2 Specifications...

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

AXIS Camera Station Quick Installation Guide

AXIS Camera Station Quick Installation Guide AXIS Camera Station Quick Installation Guide Copyright Axis Communications AB April 2005 Rev. 3.5 Part Number 23997 1 Table of Contents Regulatory Information.................................. 3 AXIS Camera

More information

ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young

ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction

More information

Vidyo Network Configuration Guide Windows XP and Vista

Vidyo Network Configuration Guide Windows XP and Vista Vidyo Network Configuration Guide Windows XP and Vista Introduction Vidyo is a new video conferencing system used in the latest Attend Anywhere professional networking, video collaboration & service delivery

More information

Countermeasures for Attacks on Satellite TV Cards using Open Receivers

Countermeasures for Attacks on Satellite TV Cards using Open Receivers Countermeasures for Attacks on Satellite TV Cards using Open Receivers Lishoy Francis, William G. Sirett, Keith Mayes, Konstantinos Markantonakis The Information Security Group - Smart Card Centre, Royal

More information

NIVEO Network Attached Storage Series NNAS-D5 NNAS-R4. More information: WWW.NIVEOPROFESSIONAL.COM INFO@NIVEOPROFESSIONAL.COM

NIVEO Network Attached Storage Series NNAS-D5 NNAS-R4. More information: WWW.NIVEOPROFESSIONAL.COM INFO@NIVEOPROFESSIONAL.COM NIVEO Network Attached Storage Series NNAS-D5 NNAS-R4 More information: WWW.NIVEOPROFESSIONAL.COM INFO@NIVEOPROFESSIONAL.COM Product Specification Introduction The NIVEO NNAS series is specifically designed

More information

Avigilon Control Center Gateway User Guide. Version 5.4

Avigilon Control Center Gateway User Guide. Version 5.4 Avigilon Control Center Gateway User Guide Version 5.4 2006-2014 Avigilon Corporation. All rights reserved. Unless expressly granted in writing, no license is granted with respect to any copyright, industrial

More information

Arrow ECS sp. z o.o. Oracle Partner Academy training environment with Oracle Virtualization. Oracle Partner HUB

Arrow ECS sp. z o.o. Oracle Partner Academy training environment with Oracle Virtualization. Oracle Partner HUB Oracle Partner Academy training environment with Oracle Virtualization Technology Oracle Partner HUB Overview Description of technology The idea of creating new training centre was to attain light and

More information

CPSC 226 Lab Nine Fall 2015

CPSC 226 Lab Nine Fall 2015 CPSC 226 Lab Nine Fall 2015 Directions. Our overall lab goal is to learn how to use BBB/Debian as a typical Linux/ARM embedded environment, program in a traditional Linux C programming environment, and

More information

MEGA Web Application Architecture Overview MEGA 2009 SP4

MEGA Web Application Architecture Overview MEGA 2009 SP4 Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.

More information

Buildroot for Vortex86EX (2016/04/20)

Buildroot for Vortex86EX (2016/04/20) Buildroot for Vortex86EX (2016/04/20) Table of Contents Introduction...1 Prepare...1 Install Virtual Machine (optional)...1 Install Buildroot...3 Config Buildroot for VEX-SOM (optional)...4 Generate Linux

More information

Bomgar Corporation. Bomgar Application Security Assessment Summary January 26, 2015. This document is the property of Bomgar Corporation.

Bomgar Corporation. Bomgar Application Security Assessment Summary January 26, 2015. This document is the property of Bomgar Corporation. Bomgar Corporation Bomgar Application Security Assessment Summary January 26, 2015 This document is the property of Bomgar Corporation. Report Author Customer Project Document Control Document Control

More information

Keri USB-A Connection and Configuration

Keri USB-A Connection and Configuration Step 1 - Connect the KPC-1 cable to the K-USB. NOTE: The form of the USB converter may vary, so the unit you receive may not be identical to the one displayed here. Step 2 Plug the USB Connector of the

More information

Lecture 2: Computer Hardware and Ports. y.alharbi@sau.edu.sa http://faculty.sau.edu.sa/y.alharbi/en

Lecture 2: Computer Hardware and Ports. y.alharbi@sau.edu.sa http://faculty.sau.edu.sa/y.alharbi/en BMTS 242: Computer and Systems Lecture 2: Computer Hardware and Ports Yousef Alharbi Email Website y.alharbi@sau.edu.sa http://faculty.sau.edu.sa/y.alharbi/en The System Unit McGraw-Hill Copyright 2011

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Raspberry Pi. Set-Top-Box. http://www.raspberrypi.org 13-11-13

Raspberry Pi. Set-Top-Box. http://www.raspberrypi.org 13-11-13 Raspberry Pi Set-Top-Box http://www.raspberrypi.org 1 What is set-top box A set-top box (STB) or set-top unit (STU) is an information appliance device that generally contains a tuner and connects to a

More information

"EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION

EZHACK POPULAR SMART TV DONGLE REMOTE CODE EXECUTION "EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION CHECK POINT ALERTED EZCAST THAT ITS SMART TV DONGLE, WHICH IS USED BY APPROXIMATELY 5 MILLION USERS, IS EXPOSED TO SEVERE REMOTE CODE EXECUTION VULNERABILITIES

More information

Hardware/Software Specifications for Self-Hosted Systems (Multi-Server)

Hardware/Software Specifications for Self-Hosted Systems (Multi-Server) Hardware/Software Specifications for Self-Hosted Systems (Multi-Server) EBIX, INC. 1 Ebix Way, Johns Creek, GA 30097 Rev. 07/2015 2015 Ebix, Inc. and its subsidiaries. All Rights Reserved. This software

More information

Using Red Hat Network Satellite Server to Manage Dell PowerEdge Servers

Using Red Hat Network Satellite Server to Manage Dell PowerEdge Servers Using Red Hat Network Satellite Server to Manage Dell PowerEdge Servers Enterprise Product Group (EPG) Dell White Paper By Todd Muirhead and Peter Lillian July 2004 Contents Executive Summary... 3 Introduction...

More information

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit. SiteAudit Knowledge Base Deployment Check List June 2012 In This Article: Platform Requirements Windows Settings Discovery Configuration Before deploying SiteAudit it is recommended to review the information

More information

NETGEAR SMB Storage Line Update and ReadyNAS 2100 Introduction

NETGEAR SMB Storage Line Update and ReadyNAS 2100 Introduction NETGEAR SMB Storage Line Update and ReadyNAS 2100 Introduction June 2, 2009 ReadyNAS 2100 shown Agenda Overview New Introductions and Updates ReadyNAS 2100 ReadyNAS Remote Current Product Lineup Solutions

More information

Using the Raspberry Pi to establish a Virtual Private Network (VPN) Connection to a Home Network

Using the Raspberry Pi to establish a Virtual Private Network (VPN) Connection to a Home Network Using the Raspberry Pi to establish a Virtual Private Network (VPN) Connection to a Home Network Constadinos Lales Computer Engineering Technology New York City College of Technology, CUNY 186 Jay Street,

More information

SyncThru TM Web Admin Service Administrator Manual

SyncThru TM Web Admin Service Administrator Manual SyncThru TM Web Admin Service Administrator Manual 2007 Samsung Electronics Co., Ltd. All rights reserved. This administrator's guide is provided for information purposes only. All information included

More information

VMware Virtual Desktop Infrastructure (VDI) - The Best Strategy for Managing Desktop Environments Mike Coleman, VMware (mcoleman@vmware.

VMware Virtual Desktop Infrastructure (VDI) - The Best Strategy for Managing Desktop Environments Mike Coleman, VMware (mcoleman@vmware. VMware Virtual Desktop Infrastructure (VDI) - The Best Strategy for Managing Desktop Environments Mike Coleman, VMware (mcoleman@vmware.com) Copyright 2008 EMC Corporation. All rights reserved. Agenda

More information

User s Manual CONTENT. Nano NAS Server for USB storages. 1. Product Information...1. 2. Product Specifications.2. 3. System requirements..

User s Manual CONTENT. Nano NAS Server for USB storages. 1. Product Information...1. 2. Product Specifications.2. 3. System requirements.. CONTENT Nano NAS Server for USB storages 1. Product Information...1 2. Product Specifications.2 3. System requirements..3 4. Product Connecting. 4 5. Configuring DN-7023....5 6. Setting... 9 7. Note..

More information

CRYPTUS DIPLOMA IN IT SECURITY

CRYPTUS DIPLOMA IN IT SECURITY CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information

More information

Deep Security Vulnerability Protection Summary

Deep Security Vulnerability Protection Summary Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security

More information

Alinto Mail Server Pro

Alinto Mail Server Pro Alinto Mail Server Pro Installation Guide Alinto Version 2.0.1 Index 1. Introduction....................................................................................... 1 2. Prerequisites......................................................................................

More information

SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation

SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation A BasisOnDemand.com White Paper SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation by Prakash Palani Table of Contents 1. Purpose... 3 2. What is Web Dispatcher?... 3 3. Can

More information

Lab Objectives & Turn In

Lab Objectives & Turn In Firewall Lab This lab will apply several theories discussed throughout the networking series. The routing, installing/configuring DHCP, and setting up the services is already done. All that is left for

More information

EV-8000S. Features & Technical Specifications. EV-8000S Major Features & Specifications 1

EV-8000S. Features & Technical Specifications. EV-8000S Major Features & Specifications 1 EV-8000S Features & Technical Specifications EV-8000S Major Features & Specifications 1 I. General Description EV-8000S is fully compliant with the international DVB standard and thus transmits digital

More information

Setting up a Raspberry Pi as a WiFi access point

Setting up a Raspberry Pi as a WiFi access point Setting up a Raspberry Pi as a WiFi access point Created by lady ada Last updated on 2015-03-10 04:30:11 PM EDT Guide Contents Guide Contents Overview What you'll need Preparation Check Ethernet & Wifi

More information

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc. Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim

More information

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008 Cyber - Security and Investigations Ingrid Beierly August 18, 2008 Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities

More information

Enterprise Manager. Version 6.2. Installation Guide

Enterprise Manager. Version 6.2. Installation Guide Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on

More information

How to scan/exploit a ssl based webserver. by xxradar. http://www.radarhack.com mailto:xxradar@radarhack.com. Version 1.

How to scan/exploit a ssl based webserver. by xxradar. http://www.radarhack.com mailto:xxradar@radarhack.com. Version 1. How to scan/exploit a ssl based webserver. by xxradar. http://www.radarhack.com mailto:xxradar@radarhack.com. Version 1.0 21-09-2003 1. Introduction Sometimes late at night, playing with openssl and connecting

More information

Aspen Cloud Server Management Console

Aspen Cloud Server Management Console Aspen Cloud Server Management Console Management of Cloud Server Resources Power All Networks Ltd. User Guide June 2011, version 1.1.1 Refer to ICP V1.1 PAGE 1 Table of Content 1. Introduction... 4 2.

More information

Easy H.264 video streaming with Freescale's i.mx27 and Linux

Easy H.264 video streaming with Freescale's i.mx27 and Linux Libre Software Meeting 2009 Easy H.264 video streaming with Freescale's i.mx27 and Linux July 8th 2009 LSM, Nantes: Easy H.264 video streaming with i.mx27 and Linux 1 Presentation plan 1) i.mx27 & H.264

More information

Linux Embedded devices with PicoDebian Martin Noha 28.9.2006

Linux Embedded devices with PicoDebian Martin Noha 28.9.2006 Embedded systems Linux Embedded devices with PicoDebian Martin Noha 28.9.2006 24.03.2005 1 Agenda Why did I look in this stuff? What is an embedded device? Characteristic hardware global requirements for

More information