QSP Labs

Reverse Engineering Network Appliances

Richard Weinberger, David Gstir
sigma star gmbh
12.12.2014, 14:00 – 18:00
Seminar Room B5 (ground floor), Technikerstr. 13b, 6020 Innsbruck

Lab Description

Modern appliances use complex firmware which can harm corporate security as they may carry backdoors or are exploitable due to vulnerabilities. In this lab various reverse engineering methods will be presented and examined. Attendees will learn what basic components most network appliances share and how these can be attacked in order to find vulnerabilities or to understand how specific products work.
Language: German

Structure: Exercises with laptops
Required Skills: Basic understanding of networking and operating systems. Linux/bash skills are a plus.
Maximal number of participants: 20

About the Expert

Richard Weinberger is co-founder of sigma star gmbh which offers Linux kernel consulting services. He's been working with Linux for 10 years and works on the Linux kernel for more than four years. Besides the kernel he has a strong focus on various low level components of Linux including virtualization techniques. Upstream he currently maintains UserModeLinux and UBI Fastmap.

David Gstir graduated with an engineer's degree (Dipl.-Ing.) from the Graz University of Technology where he specialized in IT security. Besides his security analysis of the block cipher AES as part of his thesis, he researched privacy and security issues of smart meters, developed various backends for medical software and engineered software for the LHC Computing Grid. David is a senior software engineer and security expert at the sigma star consulting team.