Explore techniques for breaking into encrypted binary files through a hands-on workshop using a real-life example of encrypted 3D-printer firmware. Follow step-by-step instructions in a Jupyter notebook, learning various approaches including frequency analysis, known-plaintext attacks, floating point interpolation, and leveraging ARM architecture knowledge. Utilize tools like Matplotlib and SciPy to develop a framework for future reverse-engineering challenges. Led by Uri Shaked, co-founder of Wokwi and Google Developer Expert, this 52-minute session from Hackaday's Remoticon 2020 covers topics such as firmware analysis, encryption methods, and practical problem-solving in the field of embedded systems security.
Overview
Syllabus
Intro
The Story
Kickstarter
Problems
Firmware
Encrypted Firmware
Encryption
CallUp Notebook
Downloading Firmware
Histogram
Hex Dump
Documentation
Strings
Translation table
Serial connection
Pattern of repetitions
How I felt
Looking at the old firmware
Taught by
HACKADAY