Attify Blog

Internet of Things security, Embedded Device Exploitation, Reverse Engineering Training and Penetration Testing
Attify Blog - IoT Security, Pentesting and Exploitation
  • Fuzzing closed source IoT firmware binaries with AFL++ in Qemu mode. Fuzzing networked apps often requires desocketing and patching the binary.
  • Fuzzing closed source IoT firmware binaries with AFL++ in Qemu mode. Fuzzing networked apps often requires desocketing and patching the binary.
  • Learn step-by-step how to exploit Bootloaders using Practical attack vectors. Gain root access by loading custom kernel and filesystem using TFTP.
  • Introduction

    In this post, we will be describing the bootloader that goes by the name of Das U-Boot. We will delve into the following Das U-Boot features, including:

    - Das U-Boot Origin Story

    - The Building of Das U-Boot

    - Running Das U-Boot in an emulator (QEMU)

    - Das U-Boot

  • A bootloader is simply the part of the system that is used at start-up to assist in the process of successfully starting the system and loading the operating system kernel. Read more.

Sigma Connect

sigmaway forums

Forum

Raise a question

Access Now

sigmaway blogs

Blogs

Blog on cutting edge topics

Read More

sigmaway events

Events

Hangout with us

Learn More

sigmaway newsletter

Newsletter

Start your subscription

Signup Now