Главная
Study mode:
on
1
Intro
2
Cisco ASA devices
3
Cisco ASA 5505
4
Emulating ASA
5
Previous work
6
Presentation's goals
7
Getting firmware
8
Accessing the filesystem
9
Understanding branches
10
Still patched?
11
Reversing "lina"
12
Painful debugging (video)
13
Debugging FTW
14
"Pleasant" debugging
15
Analyzing heap internals
16
asadbg architecture
17
asadbg automation (video)
18
Statistics script
19
Secure boot?
20
Conclusion
21
Questions?
Description:
Delve into the intricacies of Cisco ASA firewalls in this 51-minute conference talk from 44CON 2017. Explore previously unpublished details of ASA internals, reverse engineering techniques, and custom-developed tools for exploit production. Learn about the generalization of exploits to cover over 100 ASA versions and achieve 100% reliability. Gain insights into firmware analysis, filesystem access, branch understanding, and the challenges of debugging the "lina" process. Discover the architecture of asadbg and its automation capabilities, along with a statistics script for vulnerability assessment. Examine secure boot considerations and engage in a Q&A session to further expand your knowledge of Cisco ASA security.

Cisco ASA Episode 2 - Striking Back - Internals and Mitigations

44CON Information Security Conference
Add to list
0:00 / 0:00