Reversing a Japanese Wireless SD Card - From Zero to Code Execution
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the process of reverse engineering a Japanese wireless SD card in this 48-minute Black Hat conference talk. Discover how to uncover the architecture and operating system of the card with minimal initial knowledge, using only open-source tools. Learn about the application of miasm2 for assembly, disassembly, and emulation, as well as the use of radare2 for firmware reverse engineering. Follow Guillaume Valadon's step-by-step investigation, from initial analysis to achieving code execution on the device. Gain insights into advanced hardware hacking techniques and the challenges of working with unfamiliar embedded systems.
Syllabus
Reversing a Japanese Wireless SD Card - From Zero to Code Execution
Taught by
Black Hat
Related Courses
Siglent SSA3032X Spectrum Analyzer Review and ExperimentsAfrotechmods via YouTube Owning the Smart Home with Logitech Harmony Hub
Security BSides San Francisco via YouTube Malware Detection and Firmware Analysis Lab
Bill Buchanan OBE via YouTube Live Breaking into Encrypted 3D Printer Firmware
Hackaday via YouTube Debugging Electronics - You Can’t Handle the Ground Truth!
Hackaday via YouTube