Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to reverse engineer compiled and frozen MicroPython modules in this technical conference talk from DEF CON 32. Explore the MicroPython firmware environment used in industrial applications, scientific projects, and DEF CON badge hacking. Master techniques for identifying and extracting frozen modules from firmware images without debug symbols using Ghidra disassembler. Dive deep into module structures, string handling, object management, and raw code data structures needed to reconstruct non-frozen modules. Follow along with detailed examples demonstrating how to read and interpret MicroPython compiled bytecode to understand module implementation and functionality. Gain practical knowledge about overcoming obstacles in reverse engineering MicroPython's unique bytecode language, which differs from CPython and requires specialized analysis approaches.
Syllabus
DEF CON 32 - Reverse Engineering MicroPython Frozen Modules - Wesley McGrew
Taught by
DEFCONConference