Army of Undead - Tailored Firmware Emulation

Army of Undead - Tailored Firmware Emulation

Hack In The Box Security Conference via YouTube Direct link

Conclusion and Further Work

20 of 20

20 of 20

Conclusion and Further Work

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Army of Undead - Tailored Firmware Emulation

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Outline
  3. 3 What? / Expectations
  4. 4 Nowadays Firmware Development - Storage
  5. 5 Nowadays Firmware Development - Distribution/ Device Upload
  6. 6 Nowadays Firmware Development - Extract Firmware from Devices
  7. 7 All Beginnings are Difficult
  8. 8 Preparations
  9. 9 Locate the Root File System
  10. 10 Identify the Architecture
  11. 11 Libraries are Relevant!
  12. 12 Script Preparation
  13. 13 Pre-Analysis - Sample Set of (Almost) 200 Firmwares across 49 Vend
  14. 14 Preparing Fake Images - Buildroot to the Rescue!
  15. 15 Preparing Fake Images - Covered Architectures
  16. 16 Monitoring and Debugging
  17. 17 Study Samples from...
  18. 18 Study Outcome of Linux Based Firmware Emulation
  19. 19 Command Injection in Phoenix Contact Devices - Analysis
  20. 20 Conclusion and Further Work

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.