25.8.2
This website uses cookies to ensure you get the best experience on our website. Learn more

Reverse Engineering Firmware with Ghidra

Short Abstract This hands-on course teaches the concepts, tools, and techniques required to reverse engineer firmware and assess embedded devices. To ensure the tools taught are available to all, we will make use of Ghidra, a powerful open-source reverse engineering tool developed by the National Security Agency. Within the two days, you will: Learn general techniques for binary reverse engineering Identify, unpack, load, and analyze various types of firmware into Ghidra Use reverse engineering techniques to find exploitable vulnerabilities in an embedded Linux device Map device vector tables, peripheral memory, and system calls to find exploitable vulnerabilities in a bare-metal device Identify remotely exploitable vulnerabilities in a Bluetooth Low Energy device Learn to use a debugger to assist in reverse engineering Labs attacking an embedded Linux system and a bare-metal Bluetooth Low Energy device will be used to deliver a hands-on experience. You can expect to leave this course with the skills to reverse firmware for a variety of embedded targets.

Skills / Knowledge

  • IoT
  • Hardware