Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Breaking Legacy Routers - 5 Zero-Days via Reversing and Hardware Hacking

Recon Conference via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn to discover zero-day vulnerabilities in legacy networking equipment through this conference talk that demonstrates the discovery of five previously unknown security flaws in widely deployed end-of-life routers. Explore hardware hacking techniques including UART communication, chip-level analysis, and board-level investigation methods that led to four of the vulnerability discoveries. Master binary reversing skills by examining how ARCompact binaries revealed a fifth zero-day vulnerability through software analysis. Understand practical exploitation techniques for extracting Wi-Fi credentials, performing lateral movement between dual System-on-Chip (SoC) architectures, and overcoming communication challenges in embedded systems. Gain insights into the security risks posed by unsupported legacy infrastructure that remains active in thousands of networks, particularly across South America, where no security patches will be available due to vendor end-of-life policies. Develop skills applicable to embedded device security research through real-world examples of hardware manipulation and reverse engineering methodologies.

Syllabus

Recon 2025 - Breaking Legacy Routers: 5 Zero-Days via Reversing and Hardware Hacking

Taught by

Recon Conference

Reviews

Start your review of Breaking Legacy Routers - 5 Zero-Days via Reversing and Hardware Hacking

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.