|
You are here |
sergioprado.blog | ||
| | | | |
www.sixfoisneuf.fr
|
|
| | | | | ||
| | | | |
reverse.put.as
|
|
| | | | | Note: the original post was written in 2017 when there weren't many posts discussing direct attacks to firmware flash. It also took a while to get in touch with the ISP to give them a chance to fix some of the issues described (in particular the ACS access) and then it was left in draft mode until today. I just made a quick revision and fixed quite a few dead links. | |
| | | | |
cybergibbons.com
|
|
| | | | | STMicroelectronics STM32 processors are some of the most common ARM microcontrollers we see in IoT devices. We often want to read the firmware from these so we can examine it and find any vulnerabi... | |
| | | | |
blog.securityinnovation.com
|
|
| | | Connected devices make up one of the largest attack surfaces. Learn how researchers extract firmware for analysis by reverse engineering updater apps. | ||