Главная
Study mode:
on
1
Introduction
2
Tals Bio
3
Research
4
Disadvantages
5
Vulnerability
6
Attack Surface
7
Analysis
8
Virtual Machines
9
Boot Partition
10
Busy Box Shell
11
Decrypt Command
12
Debug Shell
13
Linux
14
Slackware
15
Character Distribution
16
PHP Encryption
17
XDebug
18
MySQL Log
19
Setup
20
Tunnel Handler
21
Tunnel Error
22
SQL Injection Vulnerability
23
SQL Log
24
Propagation
25
Stack trace
26
Block comments
27
Failed
28
Stack Overflow
29
Field Terminator
30
Vulnerability Disclosure Process
31
Demo
32
Thanking the EFF
33
Thanking others
34
Questions
Description:
Delve into a comprehensive analysis of remote root vulnerabilities in SSL-VPN appliances through this Hack In The Box Security Conference presentation. Explore the internals of the F5 FirePass SSL-VPN Appliance, uncovering hidden vulnerabilities despite existing security protections. Follow the journey from reverse engineering to binary planting, decrypting file systems, and examining the environment. Discover how web vulnerabilities, format string vulnerabilities, and persistence lead to overcoming multiple limitations and protections, ultimately gaining a remote unauthenticated root shell. Learn about the responsible disclosure process and the exemplary vendor response from F5. Gain insights into the misconceptions surrounding "security appliances" and the potential impact on Fortune 500 companies. Benefit from the expertise of Israeli security researcher Tal Zeltzer as he shares his findings, research methods, and tools developed during this in-depth investigation.

Analysis to Remote Root 0day in a SSL-VPN Appliance

Hack In The Box Security Conference
Add to list