We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

IoT Village - Hacking the Zyxel NAS

Formal Metadata

Title
IoT Village - Hacking the Zyxel NAS
Subtitle
From the Perspective of a n00b
Alternative Title
Hacking the Zyxel NAS 326 from the Perspective of a n00b
Title of Series
Number of Parts
335
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
"This talk will convey the hacking methodology that took place in order to find the vulnerabilities within the Zyxel NAS 326, including some fun dives into the technical weeds. Note: despite how critical security flaws are, they will be not fixed by the manufacturer. First, the talk will go over the how to dump the source code from the Zyxel NAS 326, as well as understanding the organization of the device. Once we understand how the device works, we will dive into 4 independent bugs discovered on the NAS: including two remote code executions bugs (RCE) and an arbitrary file move. All of the bugs will have a step-by-step walkthrough of how they were discovered and how to exploit them with live demos. "