15 Questions
What is the main limitation of the Guardian Ear, the first baby monitoring system based on Radio Waves?
Limited by the range of radio waves at that time
Why are modern baby monitoring systems using WiFi considered to be at risk of eavesdropping?
They can be accessed remotely from anywhere in the world
What was reported about the vulnerability of Foscam baby monitors at the "Hack in the Box" conference?
Attackers can obtain username and password once the IP address is known
How can Shodan search engine help in finding vulnerable Foscam baby monitors over the internet?
By querying Shodan with information from the HTTP response
What protocol do Foscam devices use to update their hostname mapping?
User Datagram Protocol (UDP)
How do attackers abuse their knowledge of Foscam devices' hostname ranges?
To conduct phishing attacks by querying ns1.myfoscam.org
What is the purpose of the SLS hand-shake step 3?
To prove that you have physical access to the bridge
What does the Access-Control-Allow-Origin header in the server response indicate?
The victim's ability to visit a website from their local network
What is the purpose of the Smart Lighting System (SLS) hand-shake step 2?
To find your bridge and associate it with your account
What is the SLS hand-shake step 1 about?
Creating a user account
Which component sends a POST request during the SLS hand-shake process?
Philips Bridge
What is the vulnerability associated with the SLS server response header?
Access-Control-Allow-Origin allowing local network website capture
What is the purpose of the Philips Bridge in the Smart Lighting System (SLS) hand-shake?
To prove physical access to the bridge
What does Step 3 of the SLS hand-shake involve?
Website sends Setup Complete message to backend
What does Step 2 of SLS hand-shake involve?
Finding your bridge and associating it with your account
Learn about the vulnerabilities in Smart Lighting Systems, including the hand-shake process, and potential risks associated with Baby Monitors and IoT devices. This lecture covers topics related to IoT security and potential exploits in smart home devices.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free