This course covers the following learning outcomes and goals: understanding how 0-day vulnerabilities can be utilized to exploit SOHO Routers, techniques for locating and exploiting vulnerable routers, writing ARM/MIPS exploits, utilizing ROP Gadgets for Proof-Of-Concept, and exploring post-exploitation concepts. The course teaches skills such as firmware analysis, vulnerability discovery, exploit development, and post-exploitation strategies. The teaching method involves a presentation with detailed explanations, vulnerability demonstrations, and proof-of-concept exploits. The intended audience includes security professionals, ethical hackers, penetration testers, and individuals interested in embedded systems hacking and router exploitation.
Overview
Syllabus
#HITBGSEC 2015 - Lyon Yang - Advanced SOHO Router Exploitation
Taught by
Hack In The Box Security Conference