
Radoslav Gerganov
Software Engineer
Actions
Rado works on information security and is part of the Advanced Technology Group at VMware. His day job is trying to make VMware products more secure by leveraging new technologies and open-source solutions. Outside work, he exploits crappy hardware like air purifiers and set-top boxes.
Links
Hyundai head unit hacking
In this talk we will explain how to take full control over the head unit of some Hyundai, KIA and Genesis cars. We will cover the following topics: cracking official updates, reverse engineering of the stock firmware, unlocking hidden features, firmware modifications and getting root access. Finally we will try to answer the fundamental question for every piece of hardware: "Will it run Doom?"
Decrypting IPTV
Many ISPs in Bulgaria are offering IPTV to their customers in addition to internet services. Usually IPTV is delivered with a set-top box device (STB) which is connected to the ISP network and the user's TV. The security model of this solution relies on the assumption that only STBs can decrypt and play IPTV content.
I took the challenge to prove this assumption is wrong with the IPTV offering from a big telecom in Sofia. In this talk I will explain how I reverse engineered the STB firmware and figured out how video streams are encrypted. At the end, I was able to decrypt and play IPTV streams with my own programs running on a PC.
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top