Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore nifty tricks and sage advice for writing shellcode on embedded systems in this conference talk from the Hack In The Box Security Conference. Learn time-saving techniques for developing exploits on small embedded devices like smart meters, thermostats, keyboards, and mice. Discover how to create portable ARM shellcode, exploit memory corruption on 8-bit micros, develop embedded exploits without a debugger, and blindly assemble ROP chains without firmware images. Gain insights from Travis Goodspeed, a reverse engineer known for key-extraction exploits and USB hardware emulation tools, as he shares clever strategies for overcoming challenges in embedded system exploitation.