2025-10-30 –, Main Hall
This talk is a verbal/presentation version of my two part blog series on ASUS.
Part 1 can be read here: https://mrbruh.com/asusdriverhub/
Part 2 can be read here: https://mrbruh.com/asus_p2/
I am a self-taught pentester who is in my last year of working towards my bachelors degree. I sometimes pentest various systems to bolster my CV with my blog articles on https://mrbruh.com as well as self-contracting out from time to time.
In part 1 of the ASUS series I find a One-Click RCE in their DriverHub software which pre-installs itself on all new motherboards, this DriverHub software opens a RPC endpoint that any browser can access. Normally this endpoint is protected by a origin check but I found a way to get around that, and how to bypass their signature check on any binaries you try to install via the RPC. The full article can be read here https://mrbruh.com/asusdriverhub/
In part 2 of the ASUS series I find that their MyAsus product which is also pushed by default onto many of their systems, contains (encrypted) hard coded credentials for their API. These credentials once I found out how to decrypt them, turned out that they could be used maliciously to look up any users personal information such as their phone number or full address and much more. The full article can be read here https://mrbruh.com/asus_p2/
My name is Paul, however for my cybersecurity projects I go by the pseudonym "MrBruh"
- I am a aspiring cyber security professional
- I am a final year university student aiming to graduate with a bacholers degree
- I am proficient in C, C++, Go and Python
- I specialize in Penetration Testing of Mobile & Web Apps and Reverse Engineering of Malware
- I run a blog with all my write-ups at https://mrbruh.com