Du har ikke tillatelse til å se dette opptaket. Logg deg på eller bruk din personlige lenke.
Om Dette Webinaret
This presentation walks through our efforts reverse engineering the Zaptec Pro charger, an electric vehicle charger found in many parking lots and apartment buildings around Norway.
The presentation shows how we went about testing the device, including some of our trials and errors during the process. By analyzing the device’s firmware, and compiling a custom bootloader, we were able to root the device and dig into how it works.
Although we found that security appears to have been considered at multiple steps along the way in developing the Zaptec Pro charger, the presentation also presents some potential improvement areas.
Presentasjonsholder
Harrison Sand
Harrison Sand is part of the technical risk services team at mnemonic. He has worked closely with web application security, penetration testing, embedded devices, IoT, mobile security, incident response, vulnerability management and security architecture.