refirm labs
  • Company
    • Leadership
    • Partners
    • Careers
    • News
    • Announcements
  • Products
    • Binwalk Enterprise (Centrifuge)
    • Binwalk Open Source
    • Product Comparison
  • Solutions
    • Enterprise IT
    • Industrial IoT
    • Telecom Providers
    • Device Manufacturers
    • Binwalk for Educators
  • Resources
  • Blog
  • Contact
  • Login
    • Binwalk Enterprise
    • Partner Portal
  • Get a DemoNew
refirm labs
refirm labs
  • Company
    • Leadership
    • Partners
    • Careers
    • News
    • Announcements
  • Products
    • Binwalk Enterprise (Centrifuge)
    • Binwalk Open Source
    • Product Comparison
  • Solutions
    • Enterprise IT
    • Industrial IoT
    • Telecom Providers
    • Device Manufacturers
    • Binwalk for Educators
  • Resources
  • Blog
  • Contact
  • Login
    • Binwalk Enterprise
    • Partner Portal
Get a Demo

Identification of the CABLEHAUNT eCos Bug Using GHIDRA

June 9, 2020


ECOS BUG USING GHIDRA
In this talk we will show how GHIDRA may be the preferred tool of choice for analyzing RTOS firmware images. We will demonstrate identification of a published vulnerability as a case study.

Bio:
Peter Eacmen, CTO & Co-Founder ReFirm Labs

DEFCON Black Badge winner, member of the sk3wl 0f r00t Capture the Flag Team.

A lifelong hacker, Peter began his career as a Global Network Vulnerability Analyst at the NSA where he focused on identifying and exploiting vulnerabilities in embedded devices to protect national security. He co-founded Tactical Network Solutions with Terry, where he led the engineering teams and the development of technology that became ReFirm Lab’s Centrifuge Platform®. Peter co-founded ReFirm Labs in 2017.

Peter has a BS in Computer Science and Computational Mathematics from Rensselaer Polytechnic Institute, and an MS in Computer Science and Discrete Mathematics from the Naval Postgraduate School.

 

Reposted with permission from the IoT Village Virtual Event.

Share Post
Dahua Critical Cloud Vulnerabi...
Dahua | IPVM Critical Cloud Vulnerabilities Discovered; Stanley Security; Panasonic
How to Enforce IoT Security St...

Recent Posts

  • IoT Security Compliance and Enforcement

    January 4, 2021

    IoT devices will need to adopt the same basic security requirements and compliance seen in traditional IT systems. Read to learn more.
  • IoT Cybersecurity Act 2020

    November 24, 2020

    Last week the US Senate unanimously approved the IoT Cybersecurity Improvement Act of 2020, passing the bill onto the President for his signature. Why ...
  • Embrace IoT Security Compliance or Die a Slow Death

    July 29, 2020

    IoT Security Compliance. IoT Security Standards. IoT Security Frameworks. All new buzzwords that are picking up steam. So imagine our surprise when we talk to ...
See All >
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • ...
  • 9
  • >>

refirm labs Logo

8110 Maple Lawn Blvd.
Suite 200
Fulton, MD 20759

[email protected]
Call +1 (240) 389-2443
Popular
  • About Us
  • Products
  • Resources
  • Blog
Solutions
  • Enterprise IT
  • Industrial IoT
  • Telecom Providers
  • Device Manufacturers

Facebook

  • Privacy Policy
  • Terms of Use

ReFirm Labs, Inc.