Overview
Syllabus
Intro
Past Projects
What's next?
Perfect World
Real World
Architecture and Attack Targets
Abstract Methodology
Firmware Access for Software People
Examples: SPI
Examples: UART
Examples: Bootloader
Use Vulnerability
Emulation Approaches
Firmware Emulation
Dos - NullPointer Dereference
Web Based Findings - CSRF
Web Based Findings - Gigaset Maxwell Basic
Command Injection
Injection Example (Shell Script)
How to Bypass Password?
Exploit to Delete Password
Problem!
Stack Based Buffer Overflow (ARM)
Control SPC
Exploit Development, Challenges
Device Overview
Vulnerability Overview
Recommendations for Users/Admins
Recommendations for Developers
Lessons Learned?
Taught by
44CON Information Security Conference