YoVDO

Extracting an ELF From an ESP32

Offered By: 0xdade via YouTube

Tags

ShmooCon Courses Reverse Engineering Courses IDA Pro Courses ESP32 Courses IoT security Courses Firmware Analysis Courses

Course Description

Overview

Explore the process of extracting an ELF file from an ESP32 flash dump in this informative conference talk from Shmoocon 2020. Delve into the intricacies of the Espressif ESP32 system on a chip (SoC) and its applications in mobile devices, wearable electronics, and IoT. Learn about the challenges faced during reverse engineering of ESP32 firmware images and the development of custom tooling to overcome these obstacles. Gain detailed insights into the binary format of ESP32 firmware images and the step-by-step process of converting them to ELF files. By the end of the talk, acquire the knowledge to progress from a flash dump to creating a control flow graph in IDA. Presented by Chris Lyne and Nick Miles, experienced security researchers from Tenable, this 43-minute presentation offers valuable information for those interested in embedded systems security and reverse engineering techniques.

Syllabus

Extracting an ELF From an ESP32 - Chris Lyne and Nick Miles (Shmoocon 2020)


Taught by

0xdade

Related Courses

Malware Analysis: Identifying and Defeating Packing
Pluralsight
Malware Analysis: Identifying and Defeating Code Obfuscation
Pluralsight
Getting Started with Reverse Engineering
Pluralsight
Reverse Engineering: IDA For Beginners
Udemy
Malware Analysis and Reverse Engineering Course
YouTube