We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Hacking Embedded Devices

00:00

Formal Metadata

Title
Hacking Embedded Devices
Subtitle
(Doing Bad Things to Good Hardware)
Alternative Title
Doing Bad Things to 'Good' Security Appliances
Title of Series
Number of Parts
112
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
The problem with security appliances is verifying that they are as good as the marketing has lead you to believe. You need to spend lots of money to buy a unit, or figure out how to obtain it another way; we chose eBay. We now have a hardened, encrypted, AES 256 tape storage unit and a mission, break it every way possible! We're going to dive into the finer points of the pain required to actually evaluate and disassemble a harden security appliance. We'll be delving into such fun topics as epoxy melting, de-soldering, ROM chip reading, FGPA configuration recreation, Verilog decoding, recovering the various key strands that keep the device/data secure, and any other topics we end up straying into. Phorkus (Mark Carey) (@PeakSec) is a professional Security Engineer with over 18 years of experience in the areas of Information Technology, Rapid Development Lifecycle, Long Term Development Lifecycle, Computer Security, and Research/Development Innovation. He is a partner in Peak Security Inc (www.peaksec.com) where he serves as a Principal Security Consultant and Chief Scientist. Mark has developed many security tools used throughout the corporate and government sectors. Mark has co-authored Network Auditing with Nessus (second edition), and has published internal white-papers for many government agencies. Facebook Evilrob (Rob Bathurst) is a Security and Network Engineer with over 12 years of experience with large multi-national network architecture and security engineering. His focus is on network security architecture, tool development, and high-assurance device reverse engineering. Rob has published multiple internal corporate and government whitepapers across multiple security domains, written a book on Hacking OS X, and is currently working on his Master's Degree at the University of Oxford.
Information securityHacker (term)Information securityComputer hardwareType theoryGoodness of fitFigurate numberComputer animation
WordCodeReverse engineeringQuicksortSoftwareMultiplication signVideo gamePoint (geometry)Commodore VIC-20Goodness of fitComputer animation
ArmLogicComputer hardwareMathematical analysisPoint (geometry)Multiplication signBitExtension (kinesiology)FirmwareAreaComputer hardwareSet (mathematics)Point (geometry)Slide ruleMathematical analysisInterface (computing)Hacker (term)Computer animation
Workstation <Musikinstrument>SurfaceMereologyInterface (computing)Bus (computing)Multiplication signRaw image formatEmailCovering spaceSlide ruleWorkstation <Musikinstrument>Computer hardwareMathematical analysisRange (statistics)WhiteboardMagnifying glassSurface1 (number)FluxDegree (graph theory)MiniDisc2 (number)Interface (computing)MereologyCopyright infringementComputer animation
EncryptionGUI widgetInformation securityIntrusion detection systemFirewall (computing)Information securitySet (mathematics)Computer hardwareEncryptionPhysical systemComputer animation
Digital electronicsComputer networkInformationSource codeComponent-based software engineeringVector spaceProcess (computing)ChecklistSlide ruleCASE <Informatik>QuicksortMultiplication signKey (cryptography)Bus (computing)Information securityComputer hardwareImplementationInformationParameter (computer programming)SoftwareConnectivity (graph theory)Vector space1 (number)Video gameStatic random-access memoryReverse engineeringMassMechanism designComputer fontSource codeFlash memoryOpen sourceData managementRippingRight angleBitComputer animation
OpticsBackupSoftware testingPressureAnalytic continuationElectronic mailing listBackupSoftware testingMultiplication signIntegrated development environmentReverse engineeringGoodness of fitOrientation (vector space)HookingWhiteboardPower (physics)Computer animation
BootingBefehlsprozessorEncryptionCoprocessorEmailInformation securityFlash memoryBus (computing)Mechanism designGroup actionGodRight angleCASE <Informatik>BitMultiplication signComplex (psychology)AuthenticationGauge theoryKey (cryptography)CoprocessorEncryptionVector spaceBootingComputer animation
ClefLogicInterface (computing)Square numberInterface (computing)Multiplication signFlash memorySlide ruleBitWhiteboardPersonal identification numberWechselseitiger AusschlussSet (mathematics)Computer animation
Data storage deviceEncryptionData storage devicePhysical systemPlastikkarteMultiplication signJava appletInformation securityCentralizer and normalizerSoftwareSystem administratorEncryptionComputer animation
Sheaf (mathematics)Physical systemExecution unitGame controllerComputer programmingExecution unitCentralizer and normalizerBus (computing)Workstation <Musikinstrument>Configuration spaceElectronic visual displayGoodness of fitComputer animation
Module (mathematics)Multiplication signBefehlsprozessorCuboidGoodness of fitPower (physics)Right angleBus (computing)Configuration spaceInterface (computing)Flash memoryReverse engineeringPhysical systemDevice driverSlide ruleMicrocontrollerGame controllerComputer programmingType theoryTelecommunicationSet (mathematics)Different (Kate Ryan album)SoftwareModule (mathematics)Communications protocolGreatest elementSurfaceElectric power transmissionSerial communicationIn-System-ProgrammierungWhiteboardPersonal identification numberCovering spaceFirmware
WhiteboardCASE <Informatik>WhiteboardRight angleHookingDevice driverGreatest elementFlash memoryInterface (computing)Bus (computing)Programmer (hardware)Serial communicationSystem programmingGoodness of fitPersonal identification number
WhiteboardInterface (computing)CASE <Informatik>EmailView (database)Discrete groupWhiteboardBus (computing)Game controllerBefehlsprozessorInternetworkingOffice suiteDegree (graph theory)Point (geometry)DiagramCommunications protocolAsynchronous Transfer ModeDevice driverTelecommunicationInformationControl systemNumberModule (mathematics)Key (cryptography)SoftwareFront and back endsReverse engineeringThermische ZustandsgleichungFirmware
Variable (mathematics)Numerical digitConservation lawStaff (military)CuboidStaff (military)DigitizingHand fanPersonal identification numberVariable (mathematics)Power (physics)Computer animation
ArmMotherboardWhiteboardVoltmeterPower (physics)Game controllerTotal S.A.
WhiteboardEEPROMAreaDiscrete groupFlow separationSlide ruleWhiteboardCuboidArmElectronic visual displayDevice driver2 (number)Phase transitionReal-time operating systemFlash memoryBefehlsprozessorModule (mathematics)Variety (linguistics)Inclusion map
Interface (computing)Power (physics)Game controllerMicrocontrollerBarrelled spaceSerial portInterface (computing)Source codePersonal identification numberSequenceTransmitter
Uniformer RaumPrice indexCodeZoom lensElement (mathematics)
CoprocessorVariety (linguistics)MicrocontrollerPower (physics)1 (number)NumberCASE <Informatik>Information securityEncryptionWhiteboard
Key (cryptography)HypermediaJava appletStorage area networkWhiteboardEncryptionAdvanced Encryption StandardKey (cryptography)Gauge theoryInformation securityJava appletInterface (computing)Charge carrierData managementSource codeWhiteboardEndliche ModelltheorieWindowPlastikkarteWeightCodeCASE <Informatik>Multiplication signConnectivity (graph theory)Product (business)HypermediaSystem administratorMereologyFront and back endsEncryptionBitSoftware testingRandomizationFlash memoryRevision controlNumberIdentifiabilityStorage area networkComputer hardwareDebuggerFiber (mathematics)TelecommunicationFile archiverComputer animation
Computer hardwareSign (mathematics)Proxy serverGreatest elementComputer hardwareSymbol tableTable (information)
Revision controlBitStructural loadMoment (mathematics)InformationFlash memoryCovering spaceDigital photographyField programmable gate array
HypothesisCommunications protocolHelmholtz decompositionIterationBitStreaming mediaStructural loadPersonal identification numberCASE <Informatik>Reverse engineeringBootingEntire functionFlash memoryEncryptionMultiplication signKey (cryptography)Configuration spaceInformationRight angleSet (mathematics)
Booby trapSlide ruleTracing (software)Row (database)Game theorySoftware testingCovering spaceAdditionBEEPKey (cryptography)Level (video gaming)Mechanism designInterface (computing)Computer hardwareGoodness of fitVoltmeter
Field programmable gate arrayInterface (computing)Interface (computing)Process (computing)BitFilm editing
Workstation <Musikinstrument>Degree (graph theory)FingerprintFlow separationQuicksortInterface (computing)Wellenwiderstand <Strömungsmechanik>Greatest elementPoint (geometry)Software testingWhiteboardMoment <Mathematik>Total S.A.Inheritance (object-oriented programming)Meeting/Interview
Interface (computing)Interface (computing)Semiconductor memoryAreaException handlingGreatest elementFlash memoryWhiteboardSpacetime
ArchitecturePhysical systemImplementationIntegrated development environmentEncryptionSlide ruleFunction (mathematics)outputCodecPersonal identification numberTDMASet (mathematics)Flash memoryType theoryComputer animation
Physical systemArchitectureImplementationIntegrated development environmentEncryptionBus (computing)Physical systemInformationDatabaseData storage deviceMultiplication signIntegrated development environmentImplementationWhiteboardCuboidFunctional (mathematics)Point (geometry)Process (computing)Arc (geometry)Goodness of fitKey (cryptography)Computer hardwareSpecial unitary groupTangentVariety (linguistics)Mechanism designInformation securitySoftware architectureComputer architectureComputer architectureEncryptionSoftwareDirection (geometry)Lie groupNeuroinformatikComputer animation
Computer animation
Transcript: English(auto-generated)