U-Boot, I-Hack


Posted on in Presentations

Identify potential vulnerabilities and intellectual property loss due to incorrectly configured U-Boot on embedded devices. Live demos of attacker techniques to gain device access, implant backdoors and bypass security. Attendees will learn about protecting systems by hardening U-Boot, analyzing device architecture, and methods for improving security throughout a product’s lifecycle.

Learning Objectives:
1: See common misconfigurations of U-Boot.
2: Understand risks associated with improperly secured U-Boot.
3: Learn about strategies to harden embedded devices utilizing U-Boot.

Pre-Requisites:
Product development or basic hardware knowledge of embedded systems.


Participants
Andrew Bindner

Participant

Manager, Penetration Testing, Rapid7

Carlota Bindner

Participant

Security Consultant, Rapid7

Hackers & Threats

penetration testing Internet of Things hackers & threats data security consulting & professional services


Topic

Subtopic


Share With Your Community