OrangeCon

Hal Martin

Hal studied Computer Systems Engineering and works as a software developer. One of his many hobbies is asking companies for their GPL source code, and reverse engineering embedded devices. Hal is the main developer behind the postmerkOS open-source firmware for several Meraki switch models.

You can find more information on his blog «WatchMySys» : https://watchmysys.com/blog/


Session

09-05
11:00
30min
Securing devices or profits? Examining the device security of a network appliance vendor
Hal Martin

This talk is about the hidden devices that connect you, which are not often in the spotlight but frequently in many places: SMB network appliances. Specifically, my research has focused on Cisco Meraki wired routers and wireless access points.

Secure boot is the most widely used technology to ensure the integrity of a device’s boot chain. Adversaries, both criminal and state-sponsored, are moving down the software stack and closer to firmware to gain persistence and evade detection. However, secure boot is only as strong as its weakest link, which is often the vendor implementing it.

Recently, it has become apparent that some vendors have not been adequately securing, or even changing the example keys used to sign their firmware; the so-called PKFail.

The talk will focus on the following:
* The current state of Cisco Meraki’s device security model, spanning multiple devices and product generations
* Mistakes made in implementing secure boot, allowing for execution of unsigned code on devices employing secure boot

Come and find out if the teleworker gateway, or the wireless router used in your child’s school, are really as secure as the manufacturer claims they are. And is the intent behind securing these devices really to prevent adversaries from compromising them, or more to protect the profits of the manufacturer selling them?

Track 2
Second track