ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

30C3: The Exploration and Exploitation of an SD Memory Card (EN)

Автор: Christiaan008

Загружено: 2014-01-03

Просмотров: 9662

Описание: For more information and to download the video visit: http://bit.ly/30C3_info
Playlist 30C3: http://bit.ly/30c3_pl

Speakers: bunnie | Xobs

All "managed FLASH" devices, such as SD, microSD, and SSD, contain an embedded controller to assist with the complex tasks necessary to create an abstraction of reliable, contiguous storage out of FLASH silicon that is fundamentally unreliable and unpredictably fragmented. This controller is an attack surface of interest. First, the ability to modify the block allocation and erasure algorithms introduces the opportunity to perform various MITM attacks in a virtually undetectable fashion. Second, the controller itself is typically powerful, with performance around 50MIPS, yet with a cost of mere pennies, making it an interesting and possibly useful development target for other non-storage related purposes. Finally, understanding the inner workings of the controller enables opportunities for data recovery in cards that are thought to have been erased, or have been partially damaged.

This talk demonstrates a method for reverse engineering and loading code into the microcontroller within a SD memory card.

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
30C3: The Exploration and Exploitation of an SD Memory Card (EN)

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

30C3: Even More Tamagotchis Were Harmed in the Making of this Presentation (EN)

30C3: Even More Tamagotchis Were Harmed in the Making of this Presentation (EN)

Секретная функция Z80 раскрыта спустя 40 лет!

Секретная функция Z80 раскрыта спустя 40 лет!

27c3: Console Hacking 2010 (en)

27c3: Console Hacking 2010 (en)

37C3 -  Breaking

37C3 - Breaking "DRM" in Polish trains

Intro to Hardware Reversing: Finding a UART and getting a shell

Intro to Hardware Reversing: Finding a UART and getting a shell

29C3: Many Tamagotchis Were Harmed in the Making of this Presentation (EN)

29C3: Many Tamagotchis Were Harmed in the Making of this Presentation (EN)

Как работал телефонный фрикинг

Как работал телефонный фрикинг

The Internet, Reinvented.

The Internet, Reinvented.

Defcon 21 - The Secret Life of SIM Cards

Defcon 21 - The Secret Life of SIM Cards

Reading Silicon: How to Reverse Engineer Integrated Circuits

Reading Silicon: How to Reverse Engineer Integrated Circuits

"Stop Writing Dead Programs" by Jack Rusher (Strange Loop 2022)

DEF CON 24 - Hardware Hacking Village - Matt DuHarte - Basic Firmware Extraction

DEF CON 24 - Hardware Hacking Village - Matt DuHarte - Basic Firmware Extraction

36C3 -  Intel Management Engine deep dive

36C3 - Intel Management Engine deep dive

Мир AI-агентов уже наступил. Что меняется прямо сейчас

Мир AI-агентов уже наступил. Что меняется прямо сейчас

Samy Kamkar's Crash Course in How to Be a Hardware Hacker

Samy Kamkar's Crash Course in How to Be a Hardware Hacker

7cc 4-Stroke Hybrid Electric Autonomous Boat

7cc 4-Stroke Hybrid Electric Autonomous Boat

25c3: The Ultimate Commodore 64 Talk

25c3: The Ultimate Commodore 64 Talk

The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation

The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation

HackadayU: Reverse Engineering with Ghidra Class 1

HackadayU: Reverse Engineering with Ghidra Class 1

How Do I Crack Satellite and Cable Pay TV? (33c3)

How Do I Crack Satellite and Cable Pay TV? (33c3)

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]