ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

37C3 - Adventures in Reverse Engineering Broadcom NIC Firmware

Автор: media.ccc.de

Загружено: 2024-01-11

Просмотров: 24968

Описание: https://media.ccc.de/v/37c3-11781-adv...

Unlocking a system with 100% open source firmware

In an era where vendors increasingly seek to use proprietary software in the devices around us to exert control over their users, the desire for open source software has expanded to the firmware that allows our machines to function, and platforms which individuals can trust and control have never been more important. However, changes to hardware platforms in recent years such as the Intel ME, vendor-supplied binary blobs and vendor-signed firmware images have repeatedly set back efforts to create open source firmware for the computers we use. The release of Power servers with 99% open source firmware excited many who had been searching for a computer they could trust, but one proprietary firmware blob remained: that of the Ethernet controller. This is the story of how that blob was reverse engineered and replaced with an open source replacement, delivering the first machine with desktop-class performance and 100% open source firmware in many years.

This talk is about how I reverse engineered the final remaining firmware blob on the Talos II/Blackbird POWER9 systems, enabling it to be replaced with an open source replacement, in an intensive reverse engineering effort that spanned several years.

The talk will begin by introducing the open source firmware movement and its practical and ethical motivations, and note the obstacles to delivering fully open source firmware for contemporary x86 and other platforms and explaining the motive behind the project, before moving onto a more technical discussion of the adventure of firmware reverse engineering and the obstacles encountered.

Subjects I intend to cover include: how the original proprietary firmware was reverse engineered from scratch with only limited knowledge of device internals; the long history of Broadcom NIC architecture and its evolution over time; the tools that had to be developed to enable the device probing, testing and reversing process; the story of a horrifying but necessary detour into reversing x86 real mode code and the novel methodology used to aid reversing; how modern NICs allow BMCs in servers to share network ports with the host, and the security hazards this creates; and how fully open source firmware was created legally using a clean room process.

This talk will be accessible to audiences unfamiliar with POWER9 or the open source firmware community, but is also intended to cover some new ground and be of interest to those familiar with the project. The talk will mainly be of interest to those interested in open source firmware and issues such as owner control and the security and auditability issues caused by proprietary firmware, and to those interested in reverse engineering.


Hugo Landau

https://events.ccc.de/congress/2023/h...

#37c3 #HardwareMaking

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
37C3 -  Adventures in Reverse Engineering Broadcom NIC Firmware

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Взлом микропроцессора — Reverse Engineer покажет вам, как это сделать

Взлом микропроцессора — Reverse Engineer покажет вам, как это сделать

37C3 -  Apple's iPhone 15: Under the C

37C3 - Apple's iPhone 15: Under the C

37C3 -  Full AACSess: Exposing and exploiting AACSv2 UHD DRM for your viewing pleasure

37C3 - Full AACSess: Exposing and exploiting AACSv2 UHD DRM for your viewing pleasure

37C3 -  Writing secure software

37C3 - Writing secure software

Обратная разработка прошивки ARM на «голом железе» с помощью Ghidra и SVD-Loader

Обратная разработка прошивки ARM на «голом железе» с помощью Ghidra и SVD-Loader

Intro to Hardware Reversing: Finding a UART and getting a shell

Intro to Hardware Reversing: Finding a UART and getting a shell

37C3 -  Breaking

37C3 - Breaking "DRM" in Polish trains

Взлом камеры видеонаблюдения Arlo Q: обратная разработка загрузчика

Взлом камеры видеонаблюдения Arlo Q: обратная разработка загрузчика

38C3 - Hacking yourself a satellite - recovering BEESAT-1

38C3 - Hacking yourself a satellite - recovering BEESAT-1

37C3 - Back in the Driver's Seat: Recovering Critical Data from Tesla Autopilot Using Voltage Glitch

37C3 - Back in the Driver's Seat: Recovering Critical Data from Tesla Autopilot Using Voltage Glitch

Зачем убивают нал? Под колпаком у государства  /// Рафаэль Абдулов. Fundamentum #47

Зачем убивают нал? Под колпаком у государства /// Рафаэль Абдулов. Fundamentum #47

Reading Silicon: How to Reverse Engineer Integrated Circuits

Reading Silicon: How to Reverse Engineer Integrated Circuits

37C3 -  Turning Chromebooks into regular laptops

37C3 - Turning Chromebooks into regular laptops

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

Extracting Firmware from Embedded Devices (SPI NOR Flash) ⚡

Extracting Firmware from Embedded Devices (SPI NOR Flash) ⚡

38C3 - Find My * 101

38C3 - Find My * 101

DEF CON 24 - Hardware Hacking Village - Matt DuHarte - Basic Firmware Extraction

DEF CON 24 - Hardware Hacking Village - Matt DuHarte - Basic Firmware Extraction

Тунгуска — зенитный монстр, который заставил вертолёты НАТО держаться подальше!

Тунгуска — зенитный монстр, который заставил вертолёты НАТО держаться подальше!

"Unmasking the Godfather - Reverse Engineering the Latest Android Banking Trojan" by Laurie Kirk

Учащимся об информатике и компьютерах, 1988

Учащимся об информатике и компьютерах, 1988

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]