Главная
Study mode:
on
1
Introduction
2
Why I Drink
3
Overview
4
What is Reverse Engineering
5
Why do Reverse Engineering
6
Tools
7
Test Equipment
8
Logic Analyzers
9
FCC ID
10
Opening the Case
11
Identifying Parts
12
Sample Data Sheets
13
Repopulating Interfaces
14
Repopulating Devices
15
Why Repopulating
16
Downloading Firmware
17
Example
18
General Approach
19
Entropies
20
binaries
Description:
Explore the world of reverse engineering in this comprehensive tutorial led by Mike Anderson, Chief Scientist at The PTR Group, Inc. Delve into the techniques used by crackers to break into systems and learn how to protect your products from security vulnerabilities. Discover methods for bypassing physical security, repopulating connectors on motherboards, reading flash storage, and accessing firmware updates. Gain insights into software techniques used to identify vulnerabilities in code. Examine essential tools and test equipment, including logic analyzers and FCC ID information. Learn how to open device cases, identify parts, and interpret sample data sheets. Understand the importance of repopulating interfaces and devices, and explore the process of downloading and analyzing firmware. Through practical examples and a general approach to reverse engineering, develop skills to enhance your product security and stay ahead of potential threats in today's interconnected world.

Introduction to Reverse Engineering

Linux Foundation
Add to list
0:00 / 0:00