Agenda
09:00
Attendant Registration Time
10:00
Welcome Speech
10:10
English
Red
Exploit Development
Fuzzing
Advancements in JavaScript Engine Fuzzing
Carl Smith
11:00
Break
11:20
Mandarin
🍊
Red
Exploit Development
A 3-Year Tale of Hacking a Pwn2Own Target: The Attacks, Vendor Evolution, and Lesson Learned
Orange Tsai
English
Red
Communication
How to hijack a VoLTE network
Pavel Novikov
Mandarin
Blue
Crypto
打造公平的遊戲轉蛋:在不洩漏原始碼的前提下驗證虛擬轉蛋的機率
Jing Jie Wang, 李安傑
12:00
Lunch
13:00
English
Red
Exploit Development
Ghosts of the Past: Classic PHP RCE Bugs in Trend Micro Enterprise Offerings.
Poh Jia Hao
Mandarin
Red
Communication
Reverse Engineering
Decrypting the Secrets of Network Connectivity Devices through Hardware Attacks
Ta-Lun Yen
Mandarin
Red
Exploit Development
BYOVD
Uncovering Kernel Exploits: Exploring Vulnerabilities in AMD's Windows Kernel Drivers
Zeze
13:40
Break
14:00
Mandarin
Red
Exploit Development
Endpoint Security or End of Security? Exploiting Trend Micro Apex One
Lays, Lynn
English
Red
Electron
ELECTRONizing macOS privacy - a new weapon in your red teaming armory
Wojciech Reguła
Mandarin
Red
Exploit Development
Fuzzing
搭配模糊測試對Linux核心遠端檔案系統進行漏洞挖掘
Pumpkin
Elk on Sesame Street - Cybersecurity Analysis in Action with ELK and BERT
Sheng-Shan Chen, Yuki Hung
14:40
Tea Time
15:10
Mandarin
Red
BYOVD
LPE
現代內核漏洞戰爭 - 越過所有核心防線的系統/晶片虛實混合戰法
馬聖豪
English
Red
Exploit Development
Electron
Virtual
What You See IS NOT What You Get: Pwning Electron-based Markdown Note-taking Apps
Li Jiantao
協會時間
Allen Own, CK
15:50
Break
16:00
Lightning Talk
freetsubasa & Hazel, NoBody
16:30
Closing
17:20
收場
Mandarin
Red
Communication
Reverse Engineering
Decrypting the Secrets of Network Connectivity Devices through Hardware Attacks
R1
Site
13:00 ~ 13:40
Sat, Aug 19
Talk
Type

There were few studies in the cybersecurity realm done to understand the vulnerabilities and weaknesses of Network Connectivity Devices in day-to-day operations. This research presents a comprehensive study on reversing engineering and analysis of a Network Connectivity Device deployed widely from an attacker’s perspective. Through a meticulous process, we’ll dive into intricate details of the Network Connectivity Device and its management mechanism, including firmware extraction, analysis of the likeness of hardware-level attacks while demonstrating how to mount these attacks against the device and conducting a thorough analysis of its attack surfaces.

By reverse engineering the Network Connectivity Device, we aim to gain insights into its long-hidden internal management mechanism and unveil security vulnerabilities that could be exploited by adversaries or to enable customers to truly free their devices. We explore its architecture, communication protocols, and vulnerabilities that could be exploited by any determined adversaries. We will also explore the authentication process, which has been lacking in discussion before. In the process of demonstrating such possibilities, we will also delve into details of how vendors should implement better security practices for embedded, networking, and internet-facing devices.

As real-world attacks and incidents have indicated Network Connectivity Devices, obviously exposed to the Internet for an extended period, could be a great target for staging more complex cybersecurity attacks. Thus, such Network Connectivity Devices should be examined thoroughly. However, vendors may not have enough security knowledge to secure their management mechanism, and prior studies and cybersecurity incidents show that experienced attackers could find exploits within the system even without any insights into the device.

With this research, we hope to set an example for device vendors by demonstrating how real-world attackers might mount an attack on its management mechanism or end-user devices, and by understanding the attack surfaces and potential weaknesses, we pave the way for strong security practices and a more resilient management mechanism.

Ta-Lun Yen

Sr. Vulnerability Researcher at TXOne Networks with focus on compromising everything that runs on 1 and 0’s. Long-time member of Taiwanese hacker group "UCCU Hacker". Presented various high-impacting topics at numerous International conferences.

© 2023 HITCON, All Rights Reserved.