Overview
Explore the process of reverse engineering a Japanese wireless SD card in this 48-minute Black Hat conference talk. Discover how to uncover the architecture and operating system of the card with minimal initial knowledge, using only open-source tools. Learn about the application of miasm2 for assembly, disassembly, and emulation, as well as the use of radare2 for firmware reverse engineering. Follow Guillaume Valadon's step-by-step investigation, from initial analysis to achieving code execution on the device. Gain insights into advanced hardware hacking techniques and the challenges of working with unfamiliar embedded systems.
Syllabus
Reversing a Japanese Wireless SD Card - From Zero to Code Execution
Taught by
Black Hat