Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Private Keys in Public Places - Finding and Exploiting Hidden Encryption Keys

DEFCONConference via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a critical cybersecurity presentation from DEF CON 31 that exposes how private keys, legitimate CA-blessed certificates, and encryption keys are hidden within firmware and software binaries. Learn techniques for discovering concealed secrets through three real-world examples from major manufacturers. Examine Netgear firmware to find private keys in PEM-encoded text files, investigate Fortinet firmware's custom obfuscated archive files containing Apple and Google issued certificates, and uncover a severe vulnerability in Dell software involving a static AES encryption key that can compromise any customer's vCenter environment. Gain insights into proper key management practices, the significance of developer training, and the importance of eliminating these systemic security risks in software development.

Syllabus

DEF CON 31 - Private Keys in Public Places - Tom Pohl

Taught by

DEFCONConference

Reviews

Start your review of Private Keys in Public Places - Finding and Exploiting Hidden Encryption Keys

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.