Embedded

Embedded

9 bookmarks
Custom sorting
Exploiting zero days in abandoned hardware
Exploiting zero days in abandoned hardware
We successfully exploited two discontinued network devices at DistrictCon’s inaugural Junkyard competition in February, winning runner-up for Most Innovative Exploitation Technique. Our exploit chains demonstrate why end-of-life hardware poses persistent security risks.
·blog.trailofbits.com·
Exploiting zero days in abandoned hardware
e-m-b-a/embark
e-m-b-a/embark
EMBArk - The firmware security scanning environment
·github.com·
e-m-b-a/embark