Completed
Disassembling the code
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
From Printed Circuit Boards to Exploits: Pwning IoT Devices Like a Boss - Damien Cauquil - Hack in Paris - 2018
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 What this talk is not about
- 3 What this talk is about
- 4 Existing methodologies
- 5 Digital security
- 6 Data Extraction
- 7 Data Analysis
- 8 Wireless Communications
- 9 Analogies
- 10 Smart Dog
- 11 Marvel Soft
- 12 Tools
- 13 Smart lock
- 14 A single tip
- 15 Global analysis
- 16 PCB design
- 17 Connectors
- 18 Components
- 19 Schematics
- 20 Schematic example
- 21 Data sheets
- 22 Final result
- 23 Debug mode
- 24 Modulation
- 25 Firmware
- 26 Debugging
- 27 Extracting firmware
- 28 OTA
- 29 Xcode
- 30 Search for strings
- 31 Spare data
- 32 Outofband data disparity
- 33 Target architecture
- 34 What architecture is
- 35 OS and file system
- 36 Linux
- 37 Soft device
- 38 Get SDK version
- 39 Drop binaries
- 40 Disassemble
- 41 Getting the code
- 42 Disassembling the code
- 43 Automation
- 44 Software
- 45 Github
- 46 Mobile applications
- 47 Details about everything
- 48 How do we perform this
- 49 Hardware needed
- 50 How it works
- 51 Mobile application
- 52 Lowhanging fruit
- 53 Analysis
- 54 Security issues
- 55 Replay attack
- 56 Exploit
- 57 Solution
- 58 The exploit
- 59 The more interesting thing
- 60 Reverse engineering
- 61 Conclusion
- 62 Pro tips
- 63 Start from the bottom
- 64 Epson D600 scanner
- 65 Conclusions
- 66 Questions