Video: Practical exploitation of embedded systems
Posted on 24 January 2013.
Bookmark and Share
This video from Hack in The Box conference is an in-depth exploration of the reverse engineering and exploitation of embedded systems.

It covers hardware by showing how to identify and probe debugging and I/O ports on undocumented circuit board layouts. The authors discuss software by exploring the analysis, reverse engineer and binary patching techniques for obscure real time OSes and firmware images with real world examples.



Andrea Barisani is an internationally known security researcher. He focuses on large-scale infrastructure administration and defense, forensic analysis, penetration testing and software development, with more than 10 years of professional experience in security consulting.

Daniele Bianco began his professional career during his early years at university as system administrator and IT consultant for several scientific organizations. His interest for centralized management and software integration in open source environments has focused his work on design and development of suitable R&D infrastructure.





Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //