Army of Undead - Tailored Firmware Emulation
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Syllabus
Intro
Outline
What? / Expectations
Nowadays Firmware Development - Storage
Nowadays Firmware Development - Distribution/ Device Upload
Nowadays Firmware Development - Extract Firmware from Devices
All Beginnings are Difficult
Preparations
Locate the Root File System
Identify the Architecture
Libraries are Relevant!
Script Preparation
Pre-Analysis - Sample Set of (Almost) 200 Firmwares across 49 Vend
Preparing Fake Images - Buildroot to the Rescue!
Preparing Fake Images - Covered Architectures
Monitoring and Debugging
Study Samples from...
Study Outcome of Linux Based Firmware Emulation
Command Injection in Phoenix Contact Devices - Analysis
Conclusion and Further Work
Taught by
Hack In The Box Security Conference
Related Courses
Browser Hacking With ANGLEHack In The Box Security Conference via YouTube Can A Fuzzer Match A Human
Hack In The Box Security Conference via YouTube Biometrics System Hacking in the Age of the Smart Vehicle
Hack In The Box Security Conference via YouTube ICEFALL - Revisiting A Decade Of OT Insecure-By-Design Practices
Hack In The Box Security Conference via YouTube Fuzzing the MCU of Connected Vehicles for Security and Safety
Hack In The Box Security Conference via YouTube