25.12.6
This website uses cookies to ensure you get the best experience on our website. Learn more

Reverse Engineering Firmware with Ghidra

Alek (7im3 Crisys) Ristoski

This hands-on course teaches the concepts, tools, and techniques required to reverse engineer firmware and assess embedded devices. To ensure the tools taught are available to all, we will make use of Ghidra, a powerful open-source reverse engineering tool developed by the National Security Agency.

Within the two days, you will:

Learn general techniques for binary reverse engineering

Identify, unpack, load, and analyze various types of firmware into Ghidra
Use reverse engineering techniques to find exploitable vulnerabilities in an embedded Linux device

Map device vector tables, peripheral memory, and system calls to find exploitable vulnerabilities in a bare-metal device

Identify remotely exploitable vulnerabilities in a Bluetooth Low Energy device
Learn to use a debugger to assist in reverse engineering

Labs attacking an embedded Linux system and a bare-metal Bluetooth Low Energy device will be used to deliver a hands-on experience. You can expect to leave this course with the skills to reverse firmware for a variety of embedded targets.

Skills / Knowledge

  • Hardware
  • IoT

Issued on

August 4, 2024

Expires on

Does not expire