Presented at
Still Hacking Anyway (SHA2017),
Aug. 6, 2017, 9:30 p.m.
(60 minutes).
In this talk I describe my journey into reverse engineering parts of MikroTik system to gain access to hardware features and the shell behind the RouterOS that has no “ls”.
#NetworkSecurity #DeviceSecurity
<p>MikroTik is a Latvian network device manufacturer that is gaining more and more popularity amongst network professionals and enthusiasts.</p>
<p>During the talk I'll answer these questions —</p>
<ul>
<li>Can my RouterBOARD play Für Elise?</li>
<li>How do I access the Linux behind my RouterOS?</li>
<li>What's inside a supout.rif file?</li>
</ul>
<p>— and more</p>
Presenters:
-
Kirils Solovjovs
<p>Mg. sc. comp. Kirils Solovjovs is an IT security expert and the lead researcher at 1<sup>st</sup> Ltd. He regularly perfects his professional knowledge by participating in and organizing courses, exercises and conferences. Kirils fluently speaks English and has extensive experience in network flow analysis, reverse engineering, social engineering, penetration testing, security incident investigation, and the legal dimension of cyber security and cyber defence. He has contributed to improving security of both national and international information systems.</p>
Links:
Similar Presentations: