Modern appliances use complex firmware which can harm corporate
security as they may carry backdoors or are exploitable due to
vulnerabilities. In this lab various reverse engineering methods
will be presented and examined. Attendees will learn what basic
components most network appliances share and how these can be
attacked in order to find vulnerabilities or to understand how
specific products work.
Structure: Exercises with laptops
Required Skills: Basic understanding of networking and operating systems. Linux/bash skills are a plus.
Maximal number of participants: 20
Richard Weinberger is co-founder of sigma star gmbh which offers Linux kernel consulting services. He's been working with Linux for 10 years and works on the Linux kernel for more than four years. Besides the kernel he has a strong focus on various low level components of Linux including virtualization techniques. Upstream he currently maintains UserModeLinux and UBI Fastmap.
David Gstir graduated with an engineer's degree (Dipl.-Ing.) from the Graz University of Technology where he specialized in IT security. Besides his security analysis of the block cipher AES as part of his thesis, he researched privacy and security issues of smart meters, developed various backends for medical software and engineered software for the LHC Computing Grid. David is a senior software engineer and security expert at the sigma star consulting team.