Tools of the Hardware Hacking Trade by Joe Grand
Our reliance on embedded systems, such as consumer wearables, mobile phones, medical devices, network infrastructure, and industrial control equipment, has become an inescapable fact of life. We need to seriously assess the security of such products, and understanding what tools are available for the job is a good place to start. In this webcast, Joe will take a look at the many important hardware tools used during hacking and reverse engineering, including those that monitor and decode digital communications, extract firmware, inject or spoof data, and identify or connect to debug/programming interfaces.