YoVDO

Extracting an ELF From an ESP32

Offered By: 0xdade via YouTube

Tags

ShmooCon Courses Reverse Engineering Courses IDA Pro Courses ESP32 Courses IoT security Courses Firmware Analysis Courses

Course Description

Overview

Explore the process of extracting an ELF file from an ESP32 flash dump in this informative conference talk from Shmoocon 2020. Delve into the intricacies of the Espressif ESP32 system on a chip (SoC) and its applications in mobile devices, wearable electronics, and IoT. Learn about the challenges faced during reverse engineering of ESP32 firmware images and the development of custom tooling to overcome these obstacles. Gain detailed insights into the binary format of ESP32 firmware images and the step-by-step process of converting them to ELF files. By the end of the talk, acquire the knowledge to progress from a flash dump to creating a control flow graph in IDA. Presented by Chris Lyne and Nick Miles, experienced security researchers from Tenable, this 43-minute presentation offers valuable information for those interested in embedded systems security and reverse engineering techniques.

Syllabus

Extracting an ELF From an ESP32 - Chris Lyne and Nick Miles (Shmoocon 2020)


Taught by

0xdade

Related Courses

Chip Decapping on a Budget
0xdade via YouTube
Adventures in Hardware Hacking or Building Expensive Tools on a Budget
0xdade via YouTube
Whitelisting LD PRELOAD for Fun and No Profit
0xdade via YouTube
5G Protocol Vulnerabilities and Exploits
0xdade via YouTube
Real World Zero Trust Implementation
0xdade via YouTube