Reverse Engineering and Exploiting Binaries: Hardware Hacking Part 4
Introduction In part four of our “Getting Started with IoT and Hardware Hacking” series we will reverse engineer the httpd binary and libdt.so library to look for vulnerabilities. We will take a look at how to use Ghidra to decompile and reverse engineer...
Intro To Car Hacking: Replay Attacks
Modern Car Theft In Canada (where I live), car theft has become somewhat of an epidemic. In 2022 alone, over 100,000 cars were reported stolen, that’s approximately one every five minutes, and enough to land Canada on Interpol’s list of top 10 worst countries...
Getting Started with IoT and Hardware Hacking: Part 3 – Analyzing and Enumerating Firmware
Introduction In part three of our “Getting Started with IoT and Hardware Hacking” series we will perform firmware analysis to hunt for vulnerabilities in custom firmware we loaded onto a Raspberry Pi. In the first part of the series, we looked at the...
Getting Started with IoT and Hardware Hacking: Part 2 – All About UART
Introduction This blog is part 2 in the series “Getting Started with IoT and Hardware Hacking.” In part 1, we covered some core fundamentals and how to build an affordable toolkit of IoT and hardware hacking gear. If you missed that post, make sure to check it out. ...
