8 August 2020Last year’s badge received surprisingly positive feedback from conference visitors. A whole fan community emerged around it that has since created numerous projects using badge hardware. Now that we have a certain level of expectations set let’s dive deep into implementation 😎
This year, the concept of the badge has changed a bit. We decided not to use ready-made dev boards, but to develop the entire board from scratch.
5 March 2019In the first article, we described a relatively simple method of firmware static analysis without any additional information (stripped binary). If you haven’t read it, please proceed to do so, as readers are expected to be familiar with concepts introduced in Reverse engineering STM32 firmware
1 November 2018RCE (remote code execution)
is a complete attack that uses such an exploit. In order to perform it, one writes shellcode functions to the buffer and puts the shellcode address to the stack pointer. As a result, the code that is written to the buffer gets executed.
26 September 2018Modern microcontrollers are similar to 10–20-year-old computers not only by computing power but also by their vulnerabilities. We’ll talk about the almost forgotten class of vulnerabilities, which stop being purely academic and transition to a new wave of popularity.
14 September 2018MCU manufacturers usually provide protection of the non-volatile memory from read-out by debugging probes. At first glance, the main problem of cloning the firmware of the device is solved. However, having obtained unencrypted firmware one can analyze the workflow of the code, and even change it as they wish.
We write about such stuff on
TechMaker Facebook page and teach it at
Courses