The presentation discusses the use of the BOF and exploitation techniques in discovering vulnerabilities in the KNX Net IP protocol.
- The presentation discusses the use of BOF and exploitation techniques in discovering vulnerabilities in the KNX Net IP protocol
- The KNX Net IP protocol is used in home automation, industries, and offices
- BOF and exploitation techniques can be used to mutate frames and trigger unexpected behaviors in the server
- The mutated frames are sent to the server and the responses are analyzed to detect anomalies
- The presentation provides a code example of how to use BOF and exploitation techniques to discover vulnerabilities in the KNX Net IP protocol
The presenter mentions that the KNX Net IP protocol is used in automating shutters, air conditioning, and lighting in homes, offices, and industries. The use of BOF and exploitation techniques can help detect vulnerabilities in the protocol and prevent potential attacks. The presenter also provides a code example of how to use these techniques to mutate frames and trigger unexpected behaviors in the server.