YoVDO

A Journey Into Synology NAS

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Vulnerability Analysis Courses Security Research Courses Bug Hunting Courses Embedded Device Security Courses

Course Description

Overview

Explore the intricacies of Synology NAS security in this 50-minute conference talk from Hack In The Box Security Conference. Dive into the world of Network Attached Storage (NAS) with a focus on Synology, the leader in small-business and home NAS solutions. Learn how to prepare the environment for security research, identify device models and versions through fingerprinting, and understand local services used for device management. Discover a Wireshark plugin for dissecting the syno_finder protocol, and gain insights into the login flow and internal process flow for remote access. Examine vulnerabilities from both local and remote attack perspectives that could potentially compromise the device. Benefit from the speaker's expertise as a security engineer from Qihoo 360 Nirvan Team, specializing in embedded device security. Cover topics including installation, preparation, local and remote adversary perspectives, device fingerprinting, HTTP request process flow, remote attack surfaces, and various Synology applications such as DS file, Synology Calendar, Media Server, and Audio Station.

Syllabus

MEET THE SPEAKER
TRACK1
About me
Agenda
What is NAS?
Why Synology NAS?
Synology NAS News
Previous Research
Installation - "Black" Synology Manly focus on DSM61
Preparation
Local Adversary's Perspective
Services: findhostd
Services: iscsi_snapshot_comm_core #3 signe
out-of-bounds read
improper access control
Remote Adversary's Perspective
Device Fingerprinting
Http Request Process Flow
Remote Attack Surface
DS file App
Synology Calendar
Media Server
Audio Station
What We Have Learnt


Taught by

Hack In The Box Security Conference

Related Courses

Introduction To Ethical Hacking
Codecademy
Unlocking Information Security II: An Internet Perspective
Tel Aviv University via edX
An Introduction to Ethical Hacking with Kali Linux
Packt via Coursera
Ciberseguridad. Bases y estructuras para la protección de la información
Universidad Anáhuac via edX
CVE Series: Spring4Shell (CVE-2022-22965)
Cybrary