Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Hardware Hacking for Software Geeks

Type
Video
Tags
hardware hacking
Authors
David Gustin
Event
Chaos Communication Camp 2007
Indexed on
Mar 27, 2013
URL
http://dewy.fem.tu-ilmenau.de/CCC/CCCamp07/video/m4v/cccamp07-en-2004-Hardware_Hacking_for_Software_Geeks.m4v
File name
cccamp07-en-2004-Hardware_Hacking_for_Software_Geeks.m4v
File size
323.9 MB
MD5
2e117142194e89b611c8157916bb1e29
SHA1
b2d083df9507c4add5bf50011d9d9a5f98802d05

How to build your own lab in your basement for engineering and reverse-engineering on a budget. Demystifying modern System On a Chip (SOC) Micro-Controllers for early hardware prototyping and software development. Practical reverse engineering; using your verification tools to reverse engineer and modify systems without source code. A presentation on getting started with embedded engineering. There is a lot to be said about the work area required for embedded engineering, what tools you will need and how to use them to accomplish useful tasks. An overview of hardware and software necessary to develop or reverse engineer embedded devices. As you will learn in this talk the tools are the same for both tasks. When you begin an embedded project of your own, what chips do you want to use? How do you go about prototyping your hardware? What methods should be considered before designing the system. Is your task better suited to multiple microcontrollers? Once you start writing code, how do you test it? Will your method of loading a binary into your final hardware differ? Do you need to write a bootloader? All these questions need to have answers to tackle an embedded project, we will be showing a variety of methods to solve these common questions. When reverse engineering a device, you need to figure out how it was put together. You need to get into the designer's head and figure out what methods were used to create the device. As you begin to answer these questions you can slowly unravel the device's secrets. We will show some techniques for reverse engineering embedded electronics and firmware and present a plethora of resources to start you off on your own journeys into this field.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !

© 2007-2024 Alessandro Tanasi (@jekil)
To report bugs or suggest features write to .