Army of Undead - Tailored Firmware Emulation
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Syllabus
Intro
Outline
What? / Expectations
Nowadays Firmware Development - Storage
Nowadays Firmware Development - Distribution/ Device Upload
Nowadays Firmware Development - Extract Firmware from Devices
All Beginnings are Difficult
Preparations
Locate the Root File System
Identify the Architecture
Libraries are Relevant!
Script Preparation
Pre-Analysis - Sample Set of (Almost) 200 Firmwares across 49 Vend
Preparing Fake Images - Buildroot to the Rescue!
Preparing Fake Images - Covered Architectures
Monitoring and Debugging
Study Samples from...
Study Outcome of Linux Based Firmware Emulation
Command Injection in Phoenix Contact Devices - Analysis
Conclusion and Further Work
Taught by
Hack In The Box Security Conference
Related Courses
CompTIA Security+ (SY0-601) Cert Prep: 7 Endpoint Security Design and ImplementationLinkedIn Learning SSCP Cert Prep: 7 Systems and Application Security
LinkedIn Learning The Internet of Insecure Things - 10 Most Wanted List
YouTube ICEFALL - Revisiting A Decade Of OT Insecure-By-Design Practices
Hack In The Box Security Conference via YouTube Low Level BootROM Protocol Fuzzing Secure Memory Regions
Hack In The Box Security Conference via YouTube