An interview with Chris Gerlinsky
30 Jun 2019
In another episode recorded at the
Hardwear.io
conference, Alvaro talked to Chris Gerlinksy(
@akacastor
) about ROM extraction and other IC reverse engineering tools/techniques.
Here are links to some of the things/topics mentioned:
Chris' Hardwear.io Talk
Chris’ talk about cracking satellite and pay tv systems from 33C3
Micro-probing
Wet Etching
Chemical Mechanical Polishing (CMP)
John McMaster’s SiliconPr0n.org
Implant ROM
Focused Ion Beam (FIB)
Reversing the Nintendo 64 CIC - REcon 2015
Chris’ consulting site -
http://pdrnorth.com
Have comments or suggestions for us? Find us on twitter
@unnamed_show
, or email us at
show@unnamedre.com
.
Music by
TeknoAxe
(
http://www.youtube.com/user/teknoaxe
)
An interview with Jonathan Brossard
23 Jun 2019
In this episode, Alvaro is joined by
Jonathan Brossard
to talk about the
Witchcraft Compiler Collection
during the
Hardwear.io
conference.
We talked about various tools/topics including:
Have comments or suggestions for us? Find us on twitter
@unnamed_show
, or email us at
show@unnamedre.com
.
Music by
TeknoAxe
(
http://www.youtube.com/user/teknoaxe
)
Interviews with Hardwear.io CTF contestants and organizers
16 Jun 2019
In this episode, Alvaro interviews contestants and organizers of the
Hardwear.io
CTF challenge
First, we’re joined by two members of the
OpenToAll
CTF team.
Graziano
and Antonius.
The second segment is with one of the creators of the CTF challenge, Philippe Teuwen(
@doegox
) from
Quarkslab
.
The third segment was with Team Pineapple.
Other topics mentioned/covered:
https://csaw.engineering.nyu.edu/ctf
https://nullcon.net
https://www.hitb.org
https://en.wikipedia.org/wiki/Tempest_(codename)
https://www.pjrc.com/teensy/
https://www.arduino.cc
https://www.nongnu.org/avrdude/
Have comments or suggestions for us? Find us on twitter
@unnamed_show
, or email us at
show@unnamedre.com
.
Music by
TeknoAxe
(
http://www.youtube.com/user/teknoaxe
)
An interview with Holly Graceful
06 Apr 2019
This week, Holly Graceful (
@HollyGraceful
,
gracefulsecurity.com
) joined us to talk about her
recent
hardware reverse engineering blog
series
and her pen(etration) testing and security career in both public and private sectors. She tells us about how she entered the field via the military and some of those differences.
We discussed breaking down projects into smaller bites. We talk about why getting access to the
JTAG
(use it for
...)
port can be super easy in the consumer product and it may be more calculated than expected. The series ends with some key fob fun.
We do a minor round up of
software defined radio
and the
USRP
used with
gnuradio
. We catch up on what Alvaro is doing with his SDRs.
Holly is working on more posts so stay follow to be updated with the latest.
Links that came up:
Have comments or suggestions for us? Find us on twitter
@unnamed_show
, or email us at
show@unnamedre.com
.
Music by
TeknoAxe
(
http://www.youtube.com/user/teknoaxe
)
An Interview with Thomas Daede
15 Mar 2019
Thomas Daede
joined us after the
Mountain View Reverse Engineering Meetup
to talk about
Ghidra
. Ghidra is the
NSA’s
newly-released-to-the-public software reverse engineering tool.
The source has not yet been released, but there’s a
Ghidra Github placeholder
.
Some of the other things we talked about:
Thomas also mentioned
@marcan42
’s example of comparing his own
PowerPC code with Ghidra’s decompiled output
.
CrowdSupply’
s
Teardown conference
is coming up in Portland, June 21-23.
BlackHoodie
will be back in the
SF Bay Area in April
.
Women in Security and Privacy
(
@wisporg
) has a
scholarship program
for DEFCON. You can
apply for the scholarship
online. They’ll cover the DEFCON ticket as well as a $500 stipend for travel/accommodation. If you want to help, you can
donate here
. Thanks to
@RachelTobac
for spreading the word! As of this episode, there are 58 scholarships available!
Jen mentioned
@pinkflawd’
s tweet about
ELF binaries
.
Have comments or suggestions for us? Find us on twitter
@unnamed_show
, or email us at
show@unnamedre.com
.
Music by
TeknoAxe
(
http://www.youtube.com/user/teknoaxe
)