Every hacker's wet dream has now become true: the ability to hack everywhere. I will present research that started from dumping firmware that led to me finding an attack chain being able to takeover and backdoor an entire nation’s FTTH modems by compromising the telecom’s infrastructure then to all of the modems via 6 0-days found within a week. It includes a story of a full teardown & analysis from a hardware attacker’s viewpoint, to how a nation-state actor might see the system as a whole. The presentation will interest both attackers and defenders in knowing how attackers could penetrate their systems, how to defend against such attacks even in worse scenarios, and also have an idea of the attack surface model of telecom equipment.
TOPIC / TRACK
Threat Research Forum
LOCATION
Taipei Nangang Exhibition Center, Hall 2
4F 4B
LEVEL
Advanced Advanced sessions explore cybersecurity topics, including architecture, tools, practical experiences, and strategy comparisons. Content often features code explanations, protocol analysis, reverse engineering, live demos, and is suitable for experienced cybersecurity professionals.
SESSION TYPE
Deep Dive Session
LANGUAGE
Chinese
SUBTOPIC
Cyber Kill Chain
Network Security
Hardware Security
CYBERSEC 2024 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy 。