Video: Practical exploitation of embedded systems
Posted on 24 January 2013.
This video from Hack in The Box conference is an in-depth exploration of the reverse engineering and exploitation of embedded systems.

It covers hardware by showing how to identify and probe debugging and I/O ports on undocumented circuit board layouts. The authors discuss software by exploring the analysis, reverse engineer and binary patching techniques for obscure real time OSes and firmware images with real world examples.



Andrea Barisani is an internationally known security researcher. He focuses on large-scale infrastructure administration and defense, forensic analysis, penetration testing and software development, with more than 10 years of professional experience in security consulting.

Daniele Bianco began his professional career during his early years at university as system administrator and IT consultant for several scientific organizations. His interest for centralized management and software integration in open source environments has focused his work on design and development of suitable R&D infrastructure.





Spotlight

The role of the cloud in the modern security architecture

Posted on 31 July 2014.  |  Stephen Pao, General Manager, Security Business at Barracuda Networks, offers advice to CISOs concerned about moving the secure storage of their documents into the cloud and discusses how the cloud shaping the modern security architecture.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 1st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //