YoVDO

Burned in AshesBaseband Fairy Tale Stories

Offered By: Recon Conference via YouTube

Tags

REcon Conference Courses Cybersecurity Courses Reverse Engineering Courses

Course Description

Overview

Explore the intricacies of Baseband remote protocols and reverse engineering methodologies in this 32-minute conference talk from Recon 2019. Delve into the speaker's personal experiences with tinkering and bug discovery, building upon the concepts introduced in the previous year's "From 0 to Infinity" presentation. Gain insights into the complex process of identifying vulnerabilities, moving beyond simplistic approaches to bug hunting. Examine a specific bug that was "burned" the previous year, offering a real-world example of the challenges and successes in Baseband security research. This talk provides valuable knowledge for those interested in mobile device security, reverse engineering, and the nuanced world of Baseband vulnerabilities.

Syllabus

Recon 2019 - Burned in AshesBaseband Fairy Tale Stories by Guy


Taught by

Recon Conference

Related Courses

Harnessing Intel Processor Trace on Windows for Fuzz
Recon Conference via YouTube
Reverse Engineering Satellite Based IP Content Distribution
Recon Conference via YouTube
Reverse Engineering Windows Defender's JavaScript Engine
Recon Conference via YouTube
DIY ARM Debugger for Wi-Fi Chips
Recon Conference via YouTube
Subverting Your Server Through Its BMC - The HPE iLO4 Case
Recon Conference via YouTube