CLOSING KEYNOTE

D2T2%20-%20Peter%20blasty%20Geissler%20-%20Breaking%20Naive%20ESSID%20WPA2%20Key%20Generation%20Algorithms D2T2%20-%20Peter%20blasty%20Geissler%20-%20Breaking%20Naive%20ESSID%20WPA2%20Key%20Generation%20Algorithms

28.05.2016 Views

IN STICKERS WE TRUST - BLASTY @ HITBAMS2016 BOOT LOADER CODE EXECUTION TRICKS ▸ Broadcom CFE shell is pretty nice ▸ They give you PEEK and POKE ! ▸ Oh, and “jump to address” :-) ▸ Requesting a series of POKEs followed by a jump is a useful code execution primitive

IN STICKERS WE TRUST - BLASTY @ HITBAMS2016 DIRTY HACKS AT ITS FINEST

IN STICKERS WE TRUST - BLASTY @ HITBAMS2016<br />

BOOT LOADER CODE EXECUTION TRICKS<br />

▸ Broadcom CFE shell is pretty nice<br />

▸ They give you PEEK and POKE !<br />

▸ Oh, and “jump to address” :-)<br />

▸ Requesting a series of POKEs followed by a jump is a<br />

useful code execution primitive

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!