Reversing and Exploiting Embedded Devices - Walking the Software and Hardware Stack
Offered By: YouTube
Course Description
Overview
Explore the intricacies of reversing and exploiting embedded devices in this 49-minute conference talk from GrrCon 2016. Walk through both the software and hardware stack as Elvis Collado demonstrates techniques for analyzing and manipulating embedded systems. Gain insights into the vulnerabilities and potential attack vectors present in these devices, and learn practical approaches for reverse engineering their components. Delve into the world of embedded security and discover how to identify and exploit weaknesses in these increasingly ubiquitous technologies.
Syllabus
204 Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube