Best travel buddy 3vaaar!

Presented at THOTCON 0x9 (2018), May 5, 2018, 4 p.m. (25 minutes)

Travel routers are the portable devices that are meant to bring convenience and security to the savvy traveler or a digital nomad. However, they have a dark side. In this talk, I will detail the process of analysis for a selection of such devices and discuss their impact on enterprise networks. In this analysis, I will illustrate my process for discovering vulnerabilities and engineering malware to build a full attack. The talk will go through firmware teardown and reverse engineering of the MIPS binaries associated with the devices' web server. In addition to binary exploitation, this talk will cover attack scenarios that make these vulnerabilities useful and, of course, explore how an attacker could leverage innocent users to gain beachheads in enterprise networks to spread even more malware. On the defensive side, the audience will see the defenses that are employed by the devices and those that are missing. Some of these defenses could have prevented the successful exploitation of the presented vulnerability. Finally, this talk will go through attack scenarios, that uniquely leverage travel routers, that a network defender will need to consider when building a defense strategy. Finally, we'll see how the vendor has patched the zero-day vulnerabilities to prevent their customers from getting hacked!


Presenters:

  • Mikhail Sosonkin
    Mikhail is the Director of R&D at Synack where he enjoys reversing of low level systems and speaking at conferences like THOTCON.

Similar Presentations: