defcon 24 man in the middle attack in the production seismological network The following video is a Proof of concept about a man in the middle attack in the production seismological network , we were be able to get the credentials analyzing the seismograph's firmware , we have root and web gui access with the highest privileges in the system. After take control of the device (taurus) we study the possibility to take control over the data streamed from the remote station/seismograph to the acquisition ce
Hide player controls
Hide resume playing