Главная
Study mode:
on
1
Intro
2
Who am I
3
I love CTs
4
How I got into IoT
5
I fuzzed everything
6
Looking at the binary
7
Looking at the firmware
8
Getting into Exploiting
9
Debugging
10
Learning Assembly
11
Hardware
12
FCC ID
13
Internal Photos
14
Find Ground
15
CSI Enhance
16
JTAG
17
OpenOct
18
Crash Analysis
19
Ill Stop Bitching
20
RAZAM
21
DVRF
22
pox
23
Faraday cage
24
Demo time
25
MIPS vs x86
26
ARM vs x86
27
JTAG Ulor
28
OpenOCD
29
OpenOCD Interface
30
Conclusion
31
Debugger
32
Console
33
PS2 Midspaced
34
Quick Probe
35
Slides
Description:
Explore embedded device security through a comprehensive conference talk on reversing and exploiting techniques. Delve into the software and hardware stack, covering topics such as binary analysis, firmware examination, debugging, assembly language, hardware exploration, and JTAG interfacing. Learn about FCC ID research, internal photo analysis, and crash analysis techniques. Compare MIPS, ARM, and x86 architectures, and gain hands-on experience with OpenOCD for debugging. Discover practical approaches to IoT security, including fuzzing methodologies and exploitation strategies, presented by Elvis Collado at GrrCon 2016.

Reversing and Exploiting Embedded Devices - Walking the Software and Hardware Stack

Add to list