YoVDO

Fatal Fury on ESP32 - Time to Release Hardware Exploits

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Reverse Engineering Courses Hardware Security Courses Exploit Development Courses Secure Boot Courses

Course Description

Overview

Explore hardware exploitation techniques for the ESP32 in this Black Hat conference talk. Delve into methodical approaches to bypass security features through physical access and low-cost hardware methods. Learn about voltage glitching, analog side-channels, micro-soldering, and reverse engineering. Examine the ESP32's vulnerabilities, including Secure Boot, Flash Encryption, and OTP Fuses. Discover power analysis techniques, decryption methods, and their impact on device security. Gain insights into responsible disclosure practices and understand the broader implications of these exploits in the field of embedded systems security.

Syllabus

Intro
About ESP32
Code review
Secure Boot
Reverse Boot
Flash Encryption
OTP Fuses
ReadWrite Protection
Power Analysis
Results
Decryption
Conclusion
Vendors Responsible Disclosure
The Impact
Final Conclusion


Taught by

Black Hat

Related Courses

Protecting Devices and Applications in Microsoft 365
Pluralsight
vSphere 6.7 Professional Part 04: Securing a Deployment
LinkedIn Learning
VMware vSphere 7 Professional: 04 Securing a vSphere Deployment
LinkedIn Learning
The One Weird Trick SecureROM Hates - Vol. 2
nullcon via YouTube
I Boot when U-Boot
nullcon via YouTube