Hacking TP-Link Devices

Presented at TROOPERS17 (2017), March 21, 2017, 4 p.m. (Unknown duration)

TP-Link manufactures a number of network devices ranging from routers and access points to IP cameras and smart plugs. While some of these devices can be configured by both a web interface, most of them also implement proprietary protocols that allow TP-Link's proprietary applications to interact with these devices. This presentation will discuss analyze these protocols, along with their security implications. Finally, a brand-new toolkit for hacking these devices will be released.


Presenters:

  • Fernando Gont
    Fernando Gont specializes in the field of communications protocols security, working for private and governmental organizations from around the world. Gont has worked on a number of projects for the UK National Infrastructure Security Co-ordination Centre (NISCC) and the UK Centre for the Protection of National Infrastructure (CPNI) in the field of communications protocols security. As part of his work for these organizations, he has written a series of documents with recommendations for network engineers and implementers of the TCP/IP protocol suite, and has performed the first thorough security assessment of the IPv6 protocol suite. Gont is currently working as a security consultant and researcher for SI6 Networks https://www.si6networks.com) More information about Fernando Gont is available at his personal web site: https://www.gont.com.ar.

Links:

Similar Presentations: