Overview
Syllabus
Intro
Topics
Holy hole in the router, Batman!
Subject Background
Players in the SOHO Market
Evaluated SOHO Products
Why did we choose these routers?
Security Risks
Testing Methodology
Information Gathering
Scanning and Enumeration Cont.
Analyzing Web Applications Cont.
Analyzing Servers
Static Code Analysis
Fuzzing (Dynamic Analysis)
Analyze Fuzzing Results
Gaining Access Cont.
Reverse Engineering Toolz and Techniques
Exploit Development
Testing for Cross-Site Request Forgery
Testing for Command Injection
Command Injection - Vulnerable Code ?php
Command Injection Countermeasures
CSRF and Command Injection Demo
Directory Traversal #define: Directory Traversal is a form of attack where an attacker can access files and directories outside of the intended directory
Testing for Directory Traversal
Directory Traversal - Vulnerable Code ?php
Directory Traversal Countermeasures
Directory Traversal Demo
Testing for Buffer Overflows
Buffer Overflow - Vulnerable Code
Buffer Overflow Countermeasures
MIPS Architecture
ASUS RT-AC66U ROP Chain
MIPS Shellcode (RT-AC66U Exploit)
LIVE DEMO