Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Rooting DrayTek Routers Before Attackers Can - When Remote Shells Fall Into The Same Hole

Black Hat via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This Black Hat conference talk explores how security researchers discovered Remote Code Execution vulnerabilities in DrayTek networking equipment before malicious actors could exploit them. Learn about the technical analysis of DrayTek devices—which include routers, VoIP gateways, firewalls, WiFi access points, and VPN concentrators—that share core software components and therefore common vulnerabilities. Discover how researchers Stanislav Dashevskyi and Francesco La Spina from Forescout Technologies not only achieved remote code execution on the latest VPN concentrator model but also found ways to escape the emulated environment to gain full device control. The presentation details vulnerabilities affecting DrayTek's entire product line (now patched) and discusses the potential impact had these security flaws been discovered by threat actors, particularly relevant given Chinese threat actors' previous targeting of these devices since 2018.

Syllabus

When (Remote) Shells Fall Into The Same Hole: Rooting DrayTek Routers Before Attackers Can

Taught by

Black Hat

Reviews

Start your review of Rooting DrayTek Routers Before Attackers Can - When Remote Shells Fall Into The Same Hole

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.