Главная
Study mode:
on
1
Introduction
2
Tim Wright
3
Agenda
4
Embedded Device Security
5
Network Pin Tests
6
Hardware Security Research
7
Bluetooth Controlled Toilet
8
BlackEnergy
9
Safety
10
Preengagement interactions
11
Carver
12
Exploit
13
Post Exploit
14
Testing Report
15
Whats in the box
16
Getting the firmware
17
Targets
18
Tools
19
Box
20
Cable modem
21
Header
22
FCC Search
23
USPTO Search
24
Flash Chip
25
datasheet
26
intelligence gathering
27
logic analyzer
28
UART
29
Firmware
30
Firmware Review
31
P Menu
32
Read Write to Memory
33
Enable SSL
34
Lateral Movement
35
Report Time
36
Report Out
37
Report Detail
38
Wrapup
39
HRES Standard Org
Description:
Explore the HRES (Hardware Reverse Engineering Security) process in this 48-minute conference talk from Derbycon 7 (2017). Delve into embedded device security, network pin tests, and hardware security research, including a case study on a Bluetooth-controlled toilet. Learn about pre-engagement interactions, exploitation techniques, and post-exploit activities. Discover the tools and methods used in firmware analysis, including FCC and USPTO searches, logic analyzers, and UART interfaces. Gain insights into firmware review, memory manipulation, and SSL enablement. Understand the importance of lateral movement, reporting, and adherence to HRES standards in hardware security assessments.

Demonstrating the HRES Process

Add to list