Главная
Study mode:
on
1
Intro
2
The Story
3
Kickstarter
4
Problems
5
Firmware
6
Encrypted Firmware
7
Encryption
8
CallUp Notebook
9
Downloading Firmware
10
Histogram
11
Hex Dump
12
Documentation
13
Strings
14
Translation table
15
Serial connection
16
Pattern of repetitions
17
How I felt
18
Looking at the old firmware
Description:
Explore techniques for breaking into encrypted binary files through a hands-on workshop using a real-life example of encrypted 3D-printer firmware. Follow step-by-step instructions in a Jupyter notebook, learning various approaches including frequency analysis, known-plaintext attacks, floating point interpolation, and leveraging ARM architecture knowledge. Utilize tools like Matplotlib and SciPy to develop a framework for future reverse-engineering challenges. Led by Uri Shaked, co-founder of Wokwi and Google Developer Expert, this 52-minute session from Hackaday's Remoticon 2020 covers topics such as firmware analysis, encryption methods, and practical problem-solving in the field of embedded systems security.

Live Breaking into Encrypted 3D Printer Firmware

Hackaday
Add to list
0:00 / 0:00