Wednesday 29th May, 2013
10:00am to 10:50am
The presentation will cover a few simple but unusual methods of obtaining root shell on embedded devices. I will also present my latest research – backdoor in TP-Link devices which allows for unauthenticated remote root execution. The whole discovery features such problems as – path traversal, ftp chroot escape, http communication, tftp communication and configuration files overwriting.
Sign in to add slides, notes or videos to this session