Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Reverse Engineering MicroPython Frozen Modules

DEFCONConference via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to reverse engineer compiled and frozen MicroPython modules in this technical conference talk from DEF CON 32. Explore the MicroPython firmware environment used in industrial applications, scientific projects, and DEF CON badge hacking. Master techniques for identifying and extracting frozen modules from firmware images without debug symbols using Ghidra disassembler. Dive deep into module structures, string handling, object management, and raw code data structures needed to reconstruct non-frozen modules. Follow along with detailed examples demonstrating how to read and interpret MicroPython compiled bytecode to understand module implementation and functionality. Gain practical knowledge about overcoming obstacles in reverse engineering MicroPython's unique bytecode language, which differs from CPython and requires specialized analysis approaches.

Syllabus

DEF CON 32 - Reverse Engineering MicroPython Frozen Modules - Wesley McGrew

Taught by

DEFCONConference

Reviews

Start your review of Reverse Engineering MicroPython Frozen Modules

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.