YoVDO

MIPS-X - The Next IoT Frontier

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Docker Courses Virtualization Courses IoT security Courses Exploit Development Courses QEMU Courses CPU Architecture Courses Buildroot Courses Vulnerability Research Courses

Course Description

Overview

Explore MIPS-X as the next frontier in IoT vulnerability research through this conference talk from the Hack In The Box Security Conference. Learn about creating a framework and documentation for MIPS device research using a Dockerized environment. Discover techniques for setting up emulated IoT devices with minimal effort, including target MIPS architecture virtual machines with full network stacks and debugging tools. Gain insights into IoT vulnerability research methods, CPU architectures, virtualization, kernel building, cross-compilation, and system emulation. Follow along with a demo and understand the next steps in this evolving field of cybersecurity.

Syllabus

Introduction
Patrick Ross
Why should you listen
Why are we doing this
Vulnerability research and exploit development
Whats on the internet
CPU Architectures
CPU Architecture Differences
Virtualization Emulation
Building Your Own Kernel
Errors
Cross compilation
Cross compilation options
Login prompt
Single binary full system emulation
MIPS systems
Guides and notes
NVRAM
QMO
Demo
Next steps
Our project


Taught by

Hack In The Box Security Conference

Related Courses

AZ-220 - Microsoft Certified: Azure IoT Developer Specialty
A Cloud Guru
Advanced IoT Systems Integration and Industrial Applications
LearnQuest via Coursera
AWS IoT: Developing and Deploying an Internet of Things
Amazon Web Services via edX
Assessing and Managing Secure IoT Applications and Devices
LearnQuest via Coursera
Securing the IoT Landscape: From Inception to Architecture
LearnQuest via Coursera