Главная
Study mode:
on
1
MEET THE SPEAKER
2
TRACK1
3
About me
4
Agenda
5
What is NAS?
6
Why Synology NAS?
7
Synology NAS News
8
Previous Research
9
Installation - "Black" Synology Manly focus on DSM61
10
Preparation
11
Local Adversary's Perspective
12
Services: findhostd
13
Services: iscsi_snapshot_comm_core #3 signe
14
out-of-bounds read
15
improper access control
16
Remote Adversary's Perspective
17
Device Fingerprinting
18
Http Request Process Flow
19
Remote Attack Surface
20
DS file App
21
Synology Calendar
22
Media Server
23
Audio Station
24
What We Have Learnt
Description:
Explore the intricacies of Synology NAS security in this 50-minute conference talk from Hack In The Box Security Conference. Dive into the world of Network Attached Storage (NAS) with a focus on Synology, the leader in small-business and home NAS solutions. Learn how to prepare the environment for security research, identify device models and versions through fingerprinting, and understand local services used for device management. Discover a Wireshark plugin for dissecting the syno_finder protocol, and gain insights into the login flow and internal process flow for remote access. Examine vulnerabilities from both local and remote attack perspectives that could potentially compromise the device. Benefit from the speaker's expertise as a security engineer from Qihoo 360 Nirvan Team, specializing in embedded device security. Cover topics including installation, preparation, local and remote adversary perspectives, device fingerprinting, HTTP request process flow, remote attack surfaces, and various Synology applications such as DS file, Synology Calendar, Media Server, and Audio Station. Read more

A Journey Into Synology NAS

Hack In The Box Security Conference
Add to list