YoVDO

Fatal Fury on ESP32 - Time to Release Hardware Exploits

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Reverse Engineering Courses Hardware Security Courses Exploit Development Courses Secure Boot Courses

Course Description

Overview

Explore hardware exploitation techniques for the ESP32 in this Black Hat conference talk. Delve into methodical approaches to bypass security features through physical access and low-cost hardware methods. Learn about voltage glitching, analog side-channels, micro-soldering, and reverse engineering. Examine the ESP32's vulnerabilities, including Secure Boot, Flash Encryption, and OTP Fuses. Discover power analysis techniques, decryption methods, and their impact on device security. Gain insights into responsible disclosure practices and understand the broader implications of these exploits in the field of embedded systems security.

Syllabus

Intro
About ESP32
Code review
Secure Boot
Reverse Boot
Flash Encryption
OTP Fuses
ReadWrite Protection
Power Analysis
Results
Decryption
Conclusion
Vendors Responsible Disclosure
The Impact
Final Conclusion


Taught by

Black Hat

Related Courses

CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent
Reverse Engineering and Exploit Development
Udemy
Penetration Testing: Advanced Kali Linux
LinkedIn Learning
Linux x86 Assembly and Shellcoding
Udemy
Python : Sıfırdan İleri Seviyeye - Etik Hacker Örnekleriyle
Udemy