Embedded Device Vulnerability Analysis Case Study Using Trommel

Embedded Device Vulnerability Analysis Case Study Using Trommel

0xdade via YouTube Direct link

Curation

8 of 33

8 of 33

Curation

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Embedded Device Vulnerability Analysis Case Study Using Trommel

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Introductions
  3. 3 Who is Kyle
  4. 4 Agenda
  5. 5 Introduction
  6. 6 Motivation
  7. 7 Methodology
  8. 8 Curation
  9. 9 Information Gathering
  10. 10 Firmware Analysis
  11. 11 Web Application Analysis
  12. 12 Mobile Application Analysis
  13. 13 Hardware Analysis
  14. 14 Vulnerability Disclosure
  15. 15 Why Dlink
  16. 16 Background Research
  17. 17 Firmware
  18. 18 File of Interest
  19. 19 Web App
  20. 20 Wildcard Entry
  21. 21 Mobile Application
  22. 22 Identifying Markings
  23. 23 Identifying Components
  24. 24 Comparing Firmware
  25. 25 Comparing Firmware Files
  26. 26 Exploit Attempts
  27. 27 Cert Coordination Center
  28. 28 Future Work
  29. 29 Conclusion
  30. 30 Contact Information
  31. 31 Firmware File
  32. 32 File Dump
  33. 33 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.