C3Subtitles: 32c3: Beyond your cable modem
back

Beyond your cable modem

How not to do DOCSIS networks

If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!

Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.

Video duration
00:50:41
Language
English
Abstract
Did you ever want to have access to a few hundred thousand network end points? Or a few hundred thousand phone numbers? A short look behind the curtains of how not to do network security.

Have you ever wondered why cable modem providers don’t allow you to swap out your modems with your own?

Once you look at the network your modem (and thus you once you gain access to it) has access to, a whole new world of security mess-up lies ahead.

Join me in exploring how DOCSIS (the standard behind cable modems) works, how it’s used today in a real life example setup, how you could potentially make it secure and what implications this has to you as an end user. I will also show you what happens if you don't look out for security on the DOCSIS network and how that can lead to compromising other people's modems, private networks and telephone access.

Talk ID
7133
Event:
32c3
Day
1
Room
Hall 2
Start
6:30 p.m.
Duration
01:00:00
Track
Security
Type of
lecture
Speaker
Alexander Graf

Talk & Speaker speed statistics

Very rough underestimation:
150.0 wpm
807.2 spm
153.5 wpm
826.4 spm
100.0% Checking done100.0%
0.0% Syncing done0.0%
0.0% Transcribing done0.0%
0.0% Nothing done yet0.0%

Talk & Speaker speed statistics with word clouds

Whole talk:
150.0 wpm
807.2 spm
Alexander Graf:
153.5 wpm
826.4 spm