YoVDO

Fatal Fury on ESP32 - Time to Release Hardware Exploits

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Reverse Engineering Courses Hardware Security Courses Exploit Development Courses Secure Boot Courses

Course Description

Overview

Explore hardware exploitation techniques for the ESP32 in this Black Hat conference talk. Delve into methodical approaches to bypass security features through physical access and low-cost hardware methods. Learn about voltage glitching, analog side-channels, micro-soldering, and reverse engineering. Examine the ESP32's vulnerabilities, including Secure Boot, Flash Encryption, and OTP Fuses. Discover power analysis techniques, decryption methods, and their impact on device security. Gain insights into responsible disclosure practices and understand the broader implications of these exploits in the field of embedded systems security.

Syllabus

Intro
About ESP32
Code review
Secure Boot
Reverse Boot
Flash Encryption
OTP Fuses
ReadWrite Protection
Power Analysis
Results
Decryption
Conclusion
Vendors Responsible Disclosure
The Impact
Final Conclusion


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube