refirm labs
  • Company
    • Leadership
    • Partners
    • Careers
    • News
    • Announcements
  • Products
    • Binwalk Enterprise (Centrifuge)
    • Binwalk Open Source
    • Product Comparison
  • Solutions
    • Enterprise IT
    • Industrial IoT
    • Telecom Providers
    • Device Manufacturers
    • Binwalk for Educators
  • Resources
  • Blog
  • Contact
  • Login
    • Binwalk Enterprise
    • Partner Portal
  • Get a DemoNew
refirm labs
refirm labs
  • Company
    • Leadership
    • Partners
    • Careers
    • News
    • Announcements
  • Products
    • Binwalk Enterprise (Centrifuge)
    • Binwalk Open Source
    • Product Comparison
  • Solutions
    • Enterprise IT
    • Industrial IoT
    • Telecom Providers
    • Device Manufacturers
    • Binwalk for Educators
  • Resources
  • Blog
  • Contact
  • Login
    • Binwalk Enterprise
    • Partner Portal
Get a Demo

Identification of the CABLEHAUNT eCos Bug Using GHIDRA

June 9, 2020


ECOS BUG USING GHIDRA
In this talk we will show how GHIDRA may be the preferred tool of choice for analyzing RTOS firmware images. We will demonstrate identification of a published vulnerability as a case study.

Bio:
Peter Eacmen, CTO & Co-Founder ReFirm Labs

DEFCON Black Badge winner, member of the sk3wl 0f r00t Capture the Flag Team.

A lifelong hacker, Peter began his career as a Global Network Vulnerability Analyst at the NSA where he focused on identifying and exploiting vulnerabilities in embedded devices to protect national security. He co-founded Tactical Network Solutions with Terry, where he led the engineering teams and the development of technology that became ReFirm Lab’s Centrifuge Platform®. Peter co-founded ReFirm Labs in 2017.

Peter has a BS in Computer Science and Computational Mathematics from Rensselaer Polytechnic Institute, and an MS in Computer Science and Discrete Mathematics from the Naval Postgraduate School.

 

Reposted with permission from the IoT Village Virtual Event.

Share Post
Dahua Critical Cloud Vulnerabi...
Dahua | IPVM Critical Cloud Vulnerabilities Discovered; Stanley Security; Panasonic
How to Enforce IoT Security St...

Recent Posts

  • Doorbells and IoT Security Certification: Retailers Need to Step Up

    February 4, 2021

    Backdoors in popular consumer doorbells and security cameras made by Merkury/Geeni are still available from top trusted retailers in the US such as Walmart, Amazon, ...
  • Florida Tech Cybersecurity Researchers Discover Hidden Vulnerabilities in Wireless Doorbells, Cameras

    February 4, 2021

    The market for internet-connected smart doorbells and security cameras has grown substantially over the last couple of years. We recently discovered four significant vulnerabilities in ...
  • IoT Security Compliance and Enforcement

    January 4, 2021

    IoT devices will need to adopt the same basic security requirements and compliance seen in traditional IT systems. Read to learn more.
See All >
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • ...
  • 10
  • >>

refirm labs Logo

8110 Maple Lawn Blvd.
Suite 200
Fulton, MD 20759

info@refirmlabs.com
Call +1 (240) 389-2443
Popular
  • About Us
  • Products
  • Resources
  • Blog
Solutions
  • Enterprise IT
  • Industrial IoT
  • Telecom Providers
  • Device Manufacturers

Facebook

  • Privacy Policy
  • Terms of Use

ReFirm Labs, Inc.