Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Army of Undead - Tailored Firmware Emulation

Hack In The Box Security Conference via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced techniques for emulating and analyzing embedded system firmware in this comprehensive conference talk from the Hack In The Box Security Conference. Delve into methods for automating firmware emulation across various architectures without modifying the Linux kernel. Learn how to locate file system roots, determine instruction sets, and emulate target firmware using simple scripts and open-source components. Gain insights into the security implications of the growing number of embedded devices, including network cameras, routers, and programmable logic controllers (PLCs). Discover practical approaches to dissecting hardware and extracted firmware, drawing from real-world examples and research projects. Examine case studies, including a command injection vulnerability in Phoenix Contact devices, and understand the outcomes of Linux-based firmware emulation studies. Benefit from the expertise of Thomas Weber, a seasoned security researcher specializing in embedded device security and reverse engineering.

Syllabus

Intro
Outline
What? / Expectations
Nowadays Firmware Development - Storage
Nowadays Firmware Development - Distribution/ Device Upload
Nowadays Firmware Development - Extract Firmware from Devices
All Beginnings are Difficult
Preparations
Locate the Root File System
Identify the Architecture
Libraries are Relevant!
Script Preparation
Pre-Analysis - Sample Set of (Almost) 200 Firmwares across 49 Vend
Preparing Fake Images - Buildroot to the Rescue!
Preparing Fake Images - Covered Architectures
Monitoring and Debugging
Study Samples from...
Study Outcome of Linux Based Firmware Emulation
Command Injection in Phoenix Contact Devices - Analysis
Conclusion and Further Work

Taught by

Hack In The Box Security Conference

Reviews

Start your review of Army of Undead - Tailored Firmware Emulation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.