Extracting an ELF From an ESP32
Offered By: 0xdade via YouTube
Course Description
Overview
Explore the process of extracting an ELF file from an ESP32 flash dump in this informative conference talk from Shmoocon 2020. Delve into the intricacies of the Espressif ESP32 system on a chip (SoC) and its applications in mobile devices, wearable electronics, and IoT. Learn about the challenges faced during reverse engineering of ESP32 firmware images and the development of custom tooling to overcome these obstacles. Gain detailed insights into the binary format of ESP32 firmware images and the step-by-step process of converting them to ELF files. By the end of the talk, acquire the knowledge to progress from a flash dump to creating a control flow graph in IDA. Presented by Chris Lyne and Nick Miles, experienced security researchers from Tenable, this 43-minute presentation offers valuable information for those interested in embedded systems security and reverse engineering techniques.
Syllabus
Extracting an ELF From an ESP32 - Chris Lyne and Nick Miles (Shmoocon 2020)
Taught by
0xdade
Related Courses
Dal Reverse engineering alla stampa 3DUniversity of Naples Federico II via Federica Rapid Manufacturing
Indian Institute of Technology Kanpur via Swayam Generative Design for Industrial Applications
Autodesk via Coursera Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX Functional And Conceptual Design
Indian Institute of Technology Madras via Swayam