Identification of the CABLEHAUNT eCos Bug Using GHIDRA
ECOS BUG USING GHIDRA
In this talk we will show how GHIDRA may be the preferred tool of choice for analyzing RTOS firmware images. We will demonstrate identification of a published vulnerability as a case study.
Peter Eacmen, CTO & Co-Founder ReFirm Labs
DEFCON Black Badge winner, member of the sk3wl 0f r00t Capture the Flag Team.
A lifelong hacker, Peter began his career as a Global Network Vulnerability Analyst at the NSA where he focused on identifying and exploiting vulnerabilities in embedded devices to protect national security. He co-founded Tactical Network Solutions with Terry, where he led the engineering teams and the development of technology that became ReFirm Lab’s Centrifuge Platform®. Peter co-founded ReFirm Labs in 2017.
Peter has a BS in Computer Science and Computational Mathematics from Rensselaer Polytechnic Institute, and an MS in Computer Science and Discrete Mathematics from the Naval Postgraduate School.
Reposted with permission from the IoT Village Virtual Event.
IoT Security Compliance. IoT Security Standards. IoT Security Frameworks. All new buzzwords that are picking up steam. So imagine our surprise when we talk to IoT device manufacturers about why they continue to ship products with bad security and the reason they don’t fix it.
One of our favorite new capabilities in the Centrifuge Spring ‘20 release is Firmware Differencing. This is how to compare two binary files quickly and efficiently for Linux, QNX, and VxWorks. But that’s not all it compares!
With all of these certification standards and compliance regulations, conducting product cyber-security assessments quickly becomes very complicated and expensive. Here’s how to save time and money.