Overview
Explore the world of reverse engineering in this comprehensive tutorial led by Mike Anderson, Chief Scientist at The PTR Group, Inc. Delve into the techniques used by crackers to break into systems and learn how to protect your products from security vulnerabilities. Discover methods for bypassing physical security, repopulating connectors on motherboards, reading flash storage, and accessing firmware updates. Gain insights into software techniques used to identify vulnerabilities in code. Examine essential tools and test equipment, including logic analyzers and FCC ID information. Learn how to open device cases, identify parts, and interpret sample data sheets. Understand the importance of repopulating interfaces and devices, and explore the process of downloading and analyzing firmware. Through practical examples and a general approach to reverse engineering, develop skills to enhance your product security and stay ahead of potential threats in today's interconnected world.
Syllabus
Introduction
Why I Drink
Overview
What is Reverse Engineering
Why do Reverse Engineering
Tools
Test Equipment
Logic Analyzers
FCC ID
Opening the Case
Identifying Parts
Sample Data Sheets
Repopulating Interfaces
Repopulating Devices
Why Repopulating
Downloading Firmware
Example
General Approach
Entropies
binaries
Taught by
Linux Foundation