25.8.20
This website uses cookies to ensure you get the best experience on our website. Learn more

Reverse Engineering Firmware with Ghidra

This hands-on course teaches the concepts, tools, and techniques required to reverse engineer firmware and assess embedded devices. To ensure the tools taught are available to all, we will make use of Ghidra, a powerful open-source reverse engineering tool developed by the National Security Agency.Within the two days, you will:Learn general techniques for binary reverse engineeringIdentify, unpack, load, and analyze various types of firmware into GhidraUse reverse engineering techniques to find exploitable vulnerabilities in an embedded Linux deviceMap device vector tables, peripheral memory, and system calls to find exploitable vulnerabilities in a bare-metal deviceIdentify remotely exploitable vulnerabilities in a Bluetooth Low Energy deviceLearn to use a debugger to assist in reverse engineering Labs attacking an embedded Linux system and a bare-metal Bluetooth Low Energy device will be used to deliver a hands-on experience. You can expect to leave this course with the skills to reverse firmware for a variety of embedded targets.

Skills / Knowledge

  • IoT
  • Hardware