Backdoor Lockpick
Offered By: Recon Conference via YouTube
Course Description
Overview
Explore the reverse engineering of a cryptographically locked backdoor installed on Phicomm routers in this Recon Conference talk. Discover how zero-day vulnerabilities were uncovered in the backdoor protocol's implementation and learn about a tool developed to exploit these vulnerabilities, granting backdoor access to any Phicomm router released since 2017. Gain insights into the security implications of these unpatched devices and understand the process of securing them through the very backdoor that poses a threat. Access the C code for the "backdoor lockpick" tool on GitHub, which provides an unauthenticated root shell on affected Phicomm routers, and learn about the ongoing Rust port of this tool for broader platform compatibility.
Syllabus
Recon2023 OliviaLoccaFraser BackdoorLockpick
Taught by
Recon Conference
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera