Zyxel Backdoor & A Known Plaintext Attack

preview_player
Показать описание
In this video I discuss a recent finding where an undocumented admin-user account was found in Zyxel security products, accessible over SSH and via the web. As such, I showcase a simple technique called a 'Known Plaintext Attack' which can help enable you to analyse this Zyxel device firmware.

LINKS / BLOGS
============

TOOLS
======

FOLLOW
======

THANKS
=======
If you LIKED this video, please hit the THUMBS UP. If you LOVED it, please SUBSCRIBE!

Many thanks for watching, it means a lot.

Peace out. ✌️
@cybercdh
Рекомендации по теме
Комментарии
Автор

I didn't even know our country had this advanced of a cybersecurity company, good to know!

NetherFX
Автор

You are one of the few people who really get me excited for reverse engineering and binary analysis of real world applications and software !
Keep up the good work. Thank you for being awesome :)

harshvaragiya
Автор

very interesting, thank you very much Colin!

marcohiltebrand
Автор

Wonderfully presented! I really dig your videos, thanks for sharing!

HackOvert
Автор

You are working bizarely hard it seems. I hope you are doing well. NIce weekend anyways ^__^

Tarquin
Автор

Thanks for the video. What is the point of uploading the firmware on the website and protects the content with a password? If they dont want anyone to access the contents of the file, why dont they just keep the firmware offline? Maybe a good question for them.

jaylal
Автор

Damn, the size of your brain man, geeez
I'm looking into getting into Cybersecurity from 10 years of field work as an SME and now in Corporate/government IT support. Fairly knowledgeable already I am, but you bemused and lost about 4 minutes into your video...

Dammit

produKtNZ
welcome to shbcf.ru