DEFCONConference
Private Keys in Public Places - Finding and Exploiting Hidden Encryption Keys
Uncover techniques for finding hidden private keys, certificates, and encryption keys in firmware, with real-world examples from Netgear, Fortinet, and Dell's security vulnerabilities.