Reversing a Japanese Wireless SD Card — From Zero to Code Execution

Дата: 15.01.2020. Автор: CISO CLUB. Категории: Подкасты и видео по информационной безопасности

This talk will present investigations that lead to the discovery of the architecture and the operating system from nearly zero knowledge of the card. These investigations were performed with open-source tools only: miasm2 is used as the assembly, disassembly and emulation backend, while radare2 is used as the interface to reverse the firmware.

By Guillaume Valadon

Full abstract and materials: https://www.blackhat.com/us-18/briefings/schedule/#reversing-a-japanese-wireless-sd-card—from-zero-to-code-execution-10841

CISO CLUB

Об авторе CISO CLUB

Редакция CISO CLUB. Официальный аккаунт. CISO CLUB - информационный портал и профессиональное сообщество специалистов по информационной безопасности.
Читать все записи автора CISO CLUB

Добавить комментарий

Ваш адрес email не будет опубликован. Обязательные поля помечены *