Explore a comprehensive conference talk detailing successful exploitation of Qualcomm WLAN firmware, breaking isolation between WLAN and Modem, and achieving full control over the Modem via over-the-air methods. Delve into the critical role of real-time debugging for inspecting program flow and runtime status. Learn about MBA and Modem images, Modem Secure Boot, TOCTOU vulnerability, Debug Server Injection, and Qualcomm WLAN architecture. Examine reverse engineering techniques, including hints from Qualcomm and offload handlers. Understand the roadmap, mitigation strategies, and specific vulnerabilities like CVE-2019-10540 and CVE-2019-10538. Discover how to transform overflows into arbitrary writes, execute shellcode, and map Modem memory into WLAN. Gain insights into attack surfaces, memory management in Qualcomm multi-processors, and methods for delivering payloads over-the-air, including a demonstration using Pixel2.