Dahua IP camera. Where to look, what to poke?
Yuri will talk about the practical research of the security of an IP‑camera from a well‑known vendor. In the report, the speaker will look at the encryption algorithms used by the manufacturer to protect the device firmware, followed by reverse‑engineering of these algorithms. Moreover, the report will cover the firmware structure that is typical for embedded devices. Using the example of a trusted camera download chain, Yuri will demonstrate how manufacturers protect their devices and where mistakes tend to occur. The cherry on top is going to be a breakdown of a lovely feature to get access to the device’s shell via a QR‑code.