Squashing Low-hanging Fruit in Embedded Software
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Explore critical vulnerabilities in the NicheStack TCP/IP stack and learn advanced techniques for vulnerability detection and mitigation in embedded systems. Dive into a comprehensive analysis of security flaws affecting various layers of the stack, including buffer overflows, integer overflows, infinite loops, and entropy issues. Discover how researchers utilized a combination of manual analysis, fuzzing, binary-only data-flow analysis, and symbolic execution to uncover these vulnerabilities. Gain insights into automated 0-day identification methods and their potential impact on large-scale vulnerability research. Examine the vulnerability discovery process, including expected findings based on previous research and common TCP/IP anti-patterns. Learn about data-flow analysis using Ghidra's P-Code intermediate representation, function identification techniques, and function divination. Explore strategies for mitigating vulnerabilities in networked devices, including automated firmware analysis and function-based diffing. Discuss the challenges of identifying vulnerable devices on networks and detecting exploit attempts. Consider the implications of this research on supply chain vulnerabilities and Software Bill of Materials (SBOM) initiatives. Gain valuable knowledge to enhance your ability to secure embedded devices at scale and contribute to the ongoing efforts in improving cybersecurity in critical infrastructure and operational technology.
Syllabus
#HITB2021SIN D2T1 - Squashing Low-hanging Fruit In Embedded Software - D. Dos Santos & S. Menashe
Taught by
Hack In The Box Security Conference
Related Courses
Software Design Threats and MitigationsUniversity of Colorado System via Coursera Information Security - 5 - Secure Systems Engineering
Indian Institute of Technology Madras via Swayam Unlocking Information Security I: From Cryptography to Buffer Overflows
Tel Aviv University via edX Unlocking Information Security
Tel Aviv University via edX Buffer Overflow Exploits (Arabic) | OSCP Preparation
Udemy