Breaking Bootloaders on the Cheap
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a comprehensive analysis of bootloader vulnerabilities in popular microcontrollers through this 25-minute Black Hat conference talk. Delve into the reverse-engineering process of three widely used microcontrollers: NXP LPC1343, ST STM32F4, and ST STM8. Discover how researchers Qais Temeiza and David Oswald assessed the possibility of overcoming readout protection using software-based attacks. Learn about the critical vulnerability found in the "Write to RAM" command of the LPC1343 bootloader and its implications for the entire chip family. Gain valuable insights into microcontroller security and potential weaknesses in bootloader implementations.
Syllabus
Breaking Bootloaders on the Cheap
Taught by
Black Hat
Related Courses
Unlocking Information Security II: An Internet PerspectiveTel Aviv University via edX Cybersecurity Capstone: Breach Response Case Studies
IBM via Coursera Complete Ethical Hacking Bootcamp
Udemy Cyber Security Advanced Persistent Threat Defender Preview
Udemy Performing Threat Modeling with the PASTA Methodology
Pluralsight