Tearing Down (Sonic)Walls: Reverse-Engineering SonicOSX Firmware Encryption

Jon Williams, Caleb Gross

Does SonicOSX raise the bar for SonicWall device security – or simply hinder legitimate research? In this talk, we’ll walk through cracking SonicOSX: extracting keys, decrypting firmware, and analyzing its architecture. Whether you’re a vuln researcher or just starting in RE, you’ll get a hands-on guide to tackling modern firmware security, along with an open-source tool to decrypt NSv firmware.

Speaker Bio:

Caleb Gross is the Director of Capability Development at Bishop Fox, where he leads a team of offensive security professionals specializing in attack surface research and vulnerability intelligence. He previously served as an exploitation operator in the US Department of Defense’s most elite computer network exploitation (CNE) unit.

Jon Williams is a Senior Security Engineer on the Bishop Fox Capability Development team, where he spends his time hunting for vulnerabilities and writing exploits. Jon has written and presented research on various topics including enterprise wireless network attacks, bypassing network access controls, and reverse-engineering edge security device firmware.

Previous
Previous

Next
Next