![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
Overview
![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
This course focuses on exploiting vulnerabilities in the Qualcomm Trusted Execution Environment (QSEE) found in networking devices. The learning outcomes include understanding software and hardware vulnerabilities, achieving arbitrary code execution within QSEE, and analyzing the impact on device security. The course teaches skills in identifying vulnerabilities, exploiting them for code execution, and assessing device security. The teaching method involves diving into technical details of vulnerabilities and exploits, with a system-level perspective on security. The intended audience includes security professionals, researchers, and individuals interested in device security and exploitation techniques.
Syllabus
#HITB2021AMS D1T2 - Exploiting QSEE, The Raelize Way - Cristofaro Mune and Niek Timmers
Taught by
Hack In The Box Security Conference