Identification of the CABLEHAUNT eCos Bug Using GHIDRA

by Jun 9, 2020

In this talk we will show how GHIDRA may be the preferred tool of choice for analyzing RTOS firmware images. We will demonstrate identification of a published vulnerability as a case study.

Peter Eacmen, CTO & Co-Founder ReFirm Labs

DEFCON Black Badge winner, member of the sk3wl 0f r00t Capture the Flag Team.

A lifelong hacker, Peter began his career as a Global Network Vulnerability Analyst at the NSA where he focused on identifying and exploiting vulnerabilities in embedded devices to protect national security. He co-founded Tactical Network Solutions with Terry, where he led the engineering teams and the development of technology that became ReFirm Lab’s Centrifuge Platform®. Peter co-founded ReFirm Labs in 2017.

Peter has a BS in Computer Science and Computational Mathematics from Rensselaer Polytechnic Institute, and an MS in Computer Science and Discrete Mathematics from the Naval Postgraduate School.


Reposted with permission from the IoT Village Virtual Event.

Recent Posts
How to Compare Two Different Binary Files

How to Compare Two Different Binary Files

One of our favorite new capabilities in the Centrifuge Spring ‘20 release is Firmware Differencing. This is how to compare two binary files quickly and efficiently for Linux, QNX, and VxWorks. But that’s not all it compares!

How to Enforce IoT Security Standards and Compliance

How to Enforce IoT Security Standards and Compliance

With all of these certification standards and compliance regulations, conducting product cyber-security assessments quickly becomes very complicated and expensive. Here’s how to save time and money.