- Andrew MacphersonEric EvenchickReverse Engineering Firmware with GhidraCody NelsonAugust 7 - 8, 16 Credit Hours

Andrew Macpherson
Eric Evenchick
Reverse Engineering Firmware with Ghidra
Cody Nelson
August 7 - 8, 16 Credit Hours
Andrew Macpherson
Short Abstract
This hands-on course teaches the concepts, tools, and techniques required to reverse engineer firmware and assess embedded devices. To ensure the tools taught are available to all, we will make use of Ghidra, a powerful open-source reverse engineering tool developed by the National Security Agency.
Within the two days, you will:
Learn general techniques for binary reverse engineering
Identify, unpack, load, and analyze various types of firmware into Ghidra
Use reverse engineering techniques to find exploitable vulnerabilities in an embedded Linux device
Map device vector tables, peripheral memory, and system calls to find exploitable vulnerabilities in a bare-metal device
Identify remotely exploitable vulnerabilities in a Bluetooth Low Energy device
Learn to use a debugger to assist in reverse engineering
Labs attacking an embedded Linux system and a bare-metal Bluetooth Low Energy device will be used to deliver a hands-on experience. You can expect to leave this course with the skills to reverse firmware for a variety of embedded targets.
Skills / Knowledge
- IoT
- Hardware
Issued on
August 8, 2023
Expires on
Does not expire