Reversing FreeRTOS on embedded devices
RECON-BRX-2017-FreeRTOS_Embedded_Reversing RECON-BRX-2017-FreeRTOS_Embedded_Reversing
Vitor Ventura Senior Managing Security Consultant IBM X-Force Red EMEA Malware reverse Engineer Penetration Tester Blah Blah blah Blah blah blah Twiter: @__VVentura 2 RECON 2017 Brussels
About us - Vladan • Senior Managing Security Consultant in IBM EMEA XFR team • 20+ years of experience with electronics and IT • Embedded development, reverse engineering and ethical hacking 3 RECON 2017 Brussels
- Page 1: Reversing
- Page 5 and 6: Why? • Recent project challenges
- Page 7 and 8: …To Embedded • Usually around s
- Page 9 and 10: Tools of choice • IDA Pro • Cap
- Page 11 and 12: Main constraints • Limited amount
- Page 13 and 14: Software Requirements • Needs to
- Page 15 and 16: Supported high level functionalitie
- Page 17 and 18: FreeRTOS main comp
- Page 19 and 20: ̶ ̶ ̶ Security Features overview
- Page 21 and 22: ̶ ̶ Sample application • Sample
- Page 23 and 24: Application architecture C O R E Bu
- Page 25 and 26: Run // LED connected to GPIO port P
- Page 27 and 28: What is next? • Now we have creat
- Page 29 and 30: Reverse engineering on embedded sys
- Page 31 and 32: The entry point • STM32 has some
- Page 33 and 34: The entry point - IVT raw • Conte
- Page 35 and 36: The entry point - Reset Handler Now
- Page 37 and 38: Reverse engineering on STM32F0 •
- Page 39 and 40: IDA Plugin - Functions manipulating
- Page 41 and 42: Reverse engineering on STM32F0 •
- Page 43 and 44: Critical code decoding and listing
- Page 45 and 46: Interesting registers 45 RECON 2017
- Page 47: THANK YOU
Vitor Ventura<br />
Senior Managing Security C<strong>on</strong>sultant<br />
IBM X-Force Red EMEA<br />
Malware reverse Engineer<br />
Penetrati<strong>on</strong> Tester<br />
Blah<br />
Blah blah<br />
Blah blah blah<br />
Twiter: @__VVentura<br />
2 RECON 2017 Brussels