Explore nifty tricks and sage advice for writing shellcode on embedded systems in this conference talk from the Hack In The Box Security Conference. Learn time-saving techniques for developing exploits on small embedded devices like smart meters, thermostats, keyboards, and mice. Discover how to create portable ARM shellcode, exploit memory corruption on 8-bit micros, develop embedded exploits without a debugger, and blindly assemble ROP chains without firmware images. Gain insights from Travis Goodspeed, a reverse engineer known for key-extraction exploits and USB hardware emulation tools, as he shares clever strategies for overcoming challenges in embedded system exploitation.
Nifty Tricks and Sage Advice for Shellcode on Embedded Systems
Hack In The Box Security Conference via YouTube
Overview
Syllabus
#HITB2013AMS D1T1 Travis Goodspeed - Nifty Tricks and Sage Advice for Shellcode on Embedded Systems
Taught by
Hack In The Box Security Conference