To help explain how attackers reverse engineer device firmware, this walkthrough takes a piece of firmware from a binary file to an extracted file system you can explore on your own. For more information check out http://1585security.com/Firmware-Reversing-1/ This video is part of the Figurable project, which is geared toward people who are curious about IoT security and looking for that first bite of the apple.
In this video, we reverse the firmware of the Trendnet TS-S402 network storage appliance and find some undocumented "features'... |+| Related Blog Post http://
Just poking through the files to see whats in it.
Exploring and comparing some common tools and techniques for reversing binaries. https://github.com/radare/radare2 -=[ 🔴 Stuff I use ]=- → Microphone:* https
A friend told me that a GW2 trading bot implemented a dumb API. We are going to find and use it to track the bot. Play Guild Wars 2: https://account.arena.net/
Read more: http://goo.gl/WfOJST Spend enough time around Android and eventually you will come across the term, “the Linux kernel.” What is a kernel? Let’s find
Update Feb 2017 - you can now support this amazing guy via patreon: https://www.patreon.com/prof_abrasive A detailed look into Dr Abrasive's lab and what it to
By Jonas Zaddach "As embedded systems are more than ever present in our society, their security is becoming an increasingly important issue. However, with many
SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis Yan Shoshitaishvili (UC Santa Barbara) Presented at the 2016 IEEE Symposium on Sec
This challenge was part of the FLARE-On 2018 CTF. In this video we reverse engineer a basic windows .exe to find out how to win the game. At first we tried to a
How do computer hackers figure out our passwords? Learn about the techniques they use to crack the codes, and what systems protect us. Building Digital Labyr
JackkTutorials shows you how to trace an ip address from a well known Trojan called a Remote Administration Tool or RAT for short Quick Links -----------------
Windows Defender Antivirus's mpengine.dll implements the core of Defender's functionality in an enormous ~11 MB, 30,000+ function DLL. In this presentation, w
Introduction to an open source toolkit for reverse engineering. Part of the talk will be a practical demo of using radare2 for solving a simple crackme. Slides
We are using IDA to setup segments for the ARM hardware and then find the entry-point through static and dynamic analysis. GPIO: http://hertaville.com/stm32f0-
Self learning is very important in embedded systems. The new designs, architectures, new devices are coming every day in the area of embedded systems. But if yo
Samy Kamkar is a security researcher know of uncovering vulnerabilities in wireless systems. His talk at the 2017 Hackaday Superconference covered keyless entry
This lecture is a brief tutorial on angr, a binary analysis framework developed by the SecLab at UCSB. The lecture is part of the class "CS279 Advanced Topics i
A very simple reversing challenge for Linux GitHub: https://github.com/LiveOverflow/liveoverflow_youtube/tree/master/0x05_simple_crackme_intro_assembler http:/
Short video demonstrating web server emulation using a binary extracted from a firmware file.
VIDEO RUN DOWN: 01:06 - USB =========================== 01:14 - Rubber ducky: https://www.hak5.org/gear/usb-rubber-ducky 01:33 - China rubber ducky: https://ww