Главная
Study mode:
on
1
Introduction
2
Patrick Ross
3
Why should you listen
4
Why are we doing this
5
Vulnerability research and exploit development
6
Whats on the internet
7
CPU Architectures
8
CPU Architecture Differences
9
Virtualization Emulation
10
Building Your Own Kernel
11
Errors
12
Cross compilation
13
Cross compilation options
14
Login prompt
15
Single binary full system emulation
16
MIPS systems
17
Guides and notes
18
NVRAM
19
QMO
20
Demo
21
Next steps
22
Our project
Description:
Explore MIPS-X as the next frontier in IoT vulnerability research through this conference talk from the Hack In The Box Security Conference. Learn about creating a framework and documentation for MIPS device research using a Dockerized environment. Discover techniques for setting up emulated IoT devices with minimal effort, including target MIPS architecture virtual machines with full network stacks and debugging tools. Gain insights into IoT vulnerability research methods, CPU architectures, virtualization, kernel building, cross-compilation, and system emulation. Follow along with a demo and understand the next steps in this evolving field of cybersecurity.

MIPS-X - The Next IoT Frontier

Hack In The Box Security Conference
Add to list
0:00 / 0:00