YoVDO

Breaking Code Read Protection on the NXP LPC-Family Microcontrollers

Offered By: Recon Conference via YouTube

Tags

REcon Conference Courses Cybersecurity Courses Hardware Hacking Courses

Course Description

Overview

Explore a detailed analysis of bypassing Code Read Protection (CRP) in NXP LPC ARM microcontrollers in this 56-minute conference talk from Recon 2017 Brussels. Learn about the vulnerabilities in common microcontroller security features and how they can be easily exploited. Discover the process of exploiting bootloader software and developing a simple glitcher to disable CRP and access FLASH contents. Gain insights into hardware and software design, including schematics and source code, for creating a glitcher capable of bypassing CRP. Follow along as the speaker demonstrates chip vulnerability testing and formulates an attack strategy. Benefit from this beginner-level introduction to glitch attacks, presented by Chris Gerlinsky, a Canadian hacker with two decades of experience in computer security and pay TV systems.

Syllabus

Recon 2017 Brussels - Breaking Code Read Protection on the NXP LPC-family Microcontrollers


Taught by

Recon Conference

Related Courses

Harnessing Intel Processor Trace on Windows for Fuzz
Recon Conference via YouTube
Reverse Engineering Satellite Based IP Content Distribution
Recon Conference via YouTube
Reverse Engineering Windows Defender's JavaScript Engine
Recon Conference via YouTube
DIY ARM Debugger for Wi-Fi Chips
Recon Conference via YouTube
Subverting Your Server Through Its BMC - The HPE iLO4 Case
Recon Conference via YouTube