Главная
Study mode:
on
1
Intro
2
Introductions
3
Who is Kyle
4
Agenda
5
Introduction
6
Motivation
7
Methodology
8
Curation
9
Information Gathering
10
Firmware Analysis
11
Web Application Analysis
12
Mobile Application Analysis
13
Hardware Analysis
14
Vulnerability Disclosure
15
Why Dlink
16
Background Research
17
Firmware
18
File of Interest
19
Web App
20
Wildcard Entry
21
Mobile Application
22
Identifying Markings
23
Identifying Components
24
Comparing Firmware
25
Comparing Firmware Files
26
Exploit Attempts
27
Cert Coordination Center
28
Future Work
29
Conclusion
30
Contact Information
31
Firmware File
32
File Dump
33
Questions
Description:
Explore a comprehensive methodology for embedded device vulnerability analysis in this 32-minute conference talk by Kyle O'Meara and Madison Oliver from 0xdade. Learn about TROMMEL, an open-source tool designed to assist researchers in their analysis. Discover a holistic approach that goes beyond preliminary findings, encompassing firmware, web application, mobile application, and hardware analysis. Follow a case study of a Wi-Fi camera to see the methodology in action, demonstrating its applicability to various embedded devices. Gain insights into information gathering, vulnerability disclosure, and future work in this field. Benefit from the speakers' extensive experience in information technology and cybersecurity as they provide actionable strategies for more thorough and comparable embedded device research.

Embedded Device Vulnerability Analysis Case Study Using Trommel

0xdade
Add to list