When attacking IoT devices, it is often beneficial to bypass software and interact with the device’s hardware directly. Doing so allows for much greater access and control, but requires more specialized knowledge and hardware. In this stream, we will provide a quick intro to in-circuit programmers, from a hardware-hacking perspective. Using open-source software and $3 in hardware, we will interact with and modify firmware on the DEFCON Furs DEF CON 26 #badgelife badge.Bio:
Ian Sindermann is an Associate Security Analyst at Independent Security Evaluators (ISE), where he conducts rigorous security assessments of various computer hardware and software products. With a primarily self-taught education and prior experience as a wannabe sysadmin, his background lies in web application security, IoT devices, and *NIX systems. Insatiable curiosity has led to a variety of other interests including mainframes, legacy systems, hardware hacking, and whatever tech obscurities he can get his hands on.
Sign up to get our latestblogs
Follow us on Twitter for more info on this livestream @ISESecurity