How Many Bricks Does It Take to Crack a Microcell
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a comprehensive journey through hardware and software hacking in this 50-minute Black Hat USA 2012 conference talk. Delve into the speaker's adventure of reverse engineering a 3G microcell, covering a wide range of topics including hardware hacking, kernel reversing, firmware extraction and manipulation, software reversing, networking, memory forensics, and social engineering. Learn from the speaker's successes, failures, and logical approaches as they navigate through the complexities of completely disassembling and analyzing the device. Gain insights into the challenges faced by a software hacker venturing into the world of hardware hacking, and discover valuable knowledge applicable to various aspects of cybersecurity. Follow the speaker's step-by-step process, from initial attempts to access debug pins and extract the Linux kernel image, to understanding the intricacies of the device's operating system and overcoming obstacles along the way.
Syllabus
Intro
Mathew Rowley How many bricks does it take to crack a microcell?
CS541
JP1 point wuntee
JP2, JP5, JP6 draw.... no show
PL2 point debug pins
PL1 point debug pins
operating system
wuntee vs software round 3 - linux kernel image
gpl
how many bricks did it take?
Taught by
Black Hat
Related Courses
OS Analysis with VolatilityPluralsight Getting Started with Memory Forensics Using Volatility
Pluralsight Advanced Malware Analysis: Redux
Cybrary Introduction to Memory Forensics with Volatility 3
DFIRScience via YouTube Taking Memory Forensics to the Next Level
New York University (NYU) via YouTube