All times are in Pacific Daylight Time (UTC-0700).

  • Track: Main Channel: Saturday 10/10 @ 1100-1155 PDT
  • Slides

Whether network connected or standalone, firmware is the center of controlling any embedded device. As such, it is crucial to understand how firmware can be manipulated to perform unauthorized functions and potentially cripple the supporting ecosystem’s security. This presentation will provide an overview of how to get started with performing security testing and reverse engineering of firmware leveraging the OWASP Firmware Security Testing Methodology (FSTM) as guidance when embarking on an upcoming assessment.

Aaron Guzman is co-author of the “IoT Penetration Testing Cookbook” and is a Technical Leader within Cisco Meraki’s security team. He leads open-source initiatives that provide awareness around IoT security defensive strategies as well as lowering the barrier of entry into IoT hacking under OWASP’s IoT and Embedded Application Security...

Read More

twitter @scriptingxss

© 2021 ShellCon