YoVDO

ECOS Offensive Security Research Logbook

Offered By: BruCON Security Conference via YouTube

Tags

BruCON Courses Exploit Development Courses Firmware Analysis Courses Firmware Extraction Courses

Course Description

Overview

Explore the world of eCos RTOS offensive security research in this comprehensive conference talk from BruCON 0x0D. Delve into the inner workings of eCos-based devices, from cable modems to ICS components, and learn techniques for firmware analysis, exploitation, and long-term persistence. Follow along as the speaker demonstrates how to extract and analyze eCos firmware, write exploits for memory corruption vulnerabilities, and develop firmware implants. Gain insights into Broadcom's eCos internals, including interrupts, exception handling, memory layout, and heap management. Discover tools and methodologies for security professionals interested in eCos platform security, covering topics such as function identification, vtable analysis, and memory mapping. Witness practical demonstrations of exploiting vulnerabilities and achieving persistence on eCos devices. Conclude with recommendations for improving eCos security and explore future research directions in this underexplored area of embedded systems security.

Syllabus

Introduction
Disclaimers
About me
Battle plan
Extracting Firmware
Shell
Device Profile
Device Content
Cleanup
Load in Gydra
R2 Pipe
Function Offsets
Broadcom
Firmware dump
Header format
Program store
Plan
Signature Libraries
Function ID databases
Functions signatures
Function tracing
Function naming
Vtable
Rename Vtables
Address of vectors
Data segment identification
Firmware Offset
Stack Location
Stack Base Address
Memory Map
Memory Map offsets
Bugs
Memory Corruption
Store Copy
Parental Control Page
Storycuts
Heap Overflow
Device Crash
Drop Chain
Recap
Netgear
Exploit
Shellcode
Linker
Persistence
Implant
Bootkit
Persistence Demonstration
Recommendations
IP Manager
Future work
Open source
References


Taught by

BruCON Security Conference

Related Courses

Malware Detection and Firmware Analysis Lab
Bill Buchanan OBE via YouTube
OWASP IoTGoat Project Overview and Roadmap
OWASP Foundation via YouTube
Exploitation of a Hardened MSP430-Based Device - Braden Thomas - Ekoparty Security Conference - 2014
Ekoparty Security Conference via YouTube
Smart Vacuum Cleaners as Remote Wiretapping Devices - Easterhegg - 2019
media.ccc.de via YouTube
Unlocking KeeLoq - A Reverse Engineering Story
Hack In The Box Security Conference via YouTube