Video: Practical exploitation of embedded systems
Posted on 24 January 2013.
Bookmark and Share
This video from Hack in The Box conference is an in-depth exploration of the reverse engineering and exploitation of embedded systems.

It covers hardware by showing how to identify and probe debugging and I/O ports on undocumented circuit board layouts. The authors discuss software by exploring the analysis, reverse engineer and binary patching techniques for obscure real time OSes and firmware images with real world examples.



Andrea Barisani is an internationally known security researcher. He focuses on large-scale infrastructure administration and defense, forensic analysis, penetration testing and software development, with more than 10 years of professional experience in security consulting.

Daniele Bianco began his professional career during his early years at university as system administrator and IT consultant for several scientific organizations. His interest for centralized management and software integration in open source environments has focused his work on design and development of suitable R&D infrastructure.





Spotlight

What does the future hold for cloud computing?

Posted on 21 July 2014.  |  Cloud computing’s widespread adoption by businesses and consumers alike all but guarantees that, in five to ten years’ time, the technology will still be very much with us.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Jul 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //