Getting Started in Firmware Analysis & IoT Reverse Engineering

แชร์
ฝัง
  • เผยแพร่เมื่อ 10 พ.ค. 2023
  • j-h.io/bugprove || For blazing-fast automated IoT firmware analysis and zero-day discovery, you can use BugProve FOR FREE: j-h.io/bugprove
    Kavishka Gihan's original Medium article: / iot-hacking-reversing-...
    Help the channel grow with a Like, Comment, & Subscribe!
    ❤️ Support ➡ j-h.io/patreon ↔ j-h.io/paypal ↔ j-h.io/buymeacoffee
    📗Humble Bundle ➡ j-h.io/humblebundle
    🌎Follow me! ➡ j-h.io/discord ↔ j-h.io/twitter ↔ j-h.io/linkedin ↔ j-h.io/instagram ↔ j-h.io/tiktok
    📧Contact me! (I may be very slow to respond or completely unable to)
    🤝Sponsorship Inquiries ➡ j-h.io/sponsorship
    🚩 CTF Hosting Requests ➡ j-h.io/ctf
    🎤 Speaking Requests ➡ j-h.io/speaking
    💥 Malware Submission ➡ j-h.io/malware
    ❓ Everything Else ➡ j-h.io/etc

ความคิดเห็น • 61

  • @bugprove
    @bugprove ปีที่แล้ว +83

    Dark mode is on the roadmap, no worries.

    • @S0L4RW4V3
      @S0L4RW4V3 ปีที่แล้ว +6

      This is cool, are you hiring😮? I'm an IOT noob tho😢. If you are hiring, ...after I finish my cpts I will be applying haha. So cool

    • @erwynnipegerwynnipeg8455
      @erwynnipegerwynnipeg8455 ปีที่แล้ว +1

      You are insanely talented. You're super smart. I think people who reverse engineer firmware are some of the most intelligent among us and I aspire to be that spry. Have a nice day!

    • @bugprove
      @bugprove ปีที่แล้ว +4

      @@S0L4RW4V3 We are not hiring at the moment, BUT! IoT security is one of the most understaffed departments, so if this is your interest, and you pursue it, finding a job should be easy.

    • @KFLawless1412
      @KFLawless1412 ปีที่แล้ว +1

      Do you guys keep copies of all the binaries uploaded? Are you guys hoarding a bunch of stolen firmware? 🤔

  • @mossdem
    @mossdem ปีที่แล้ว +59

    My favourite thing about John is not his elite computing skills, its his ability to slot 'hey' into each sentence and it go almost unnoticed because he does it so well. We need a hey counter John!

    • @iankemboi2015
      @iankemboi2015 ปีที่แล้ว

      now am listening keenly 😂😂

    • @nagoshi01
      @nagoshi01 ปีที่แล้ว +1

      I think I'm gonna plug his channel into a tool that searches caption data and search for 'hey' lol

  • @rationalbushcraft
    @rationalbushcraft ปีที่แล้ว +11

    It has only been recent years where we started arguing to clients that they had to replace legacy firewalls. It used to be we didn't do anything with them if they were still working but then several high profile vulnerabilities pushed us into a updating and replacing program. It is crazy as we had clients with 15 year old firewalls at one point.

  • @nagoshi01
    @nagoshi01 ปีที่แล้ว +3

    Yay! Im an EE in embedded firmware, I love seeing you do this. Please more!

  • @NeverGiveUpYo
    @NeverGiveUpYo ปีที่แล้ว

    Was waiting for this for quite a while tbh.. thanks! :)

  • @kavishkagihan9495
    @kavishkagihan9495 ปีที่แล้ว +1

    Glad you took time to read the article!

  • @random_guy1024
    @random_guy1024 ปีที่แล้ว +2

    I really like how Cyber Security researchers are coming on TH-cam and teaching us stuff for absolutely FREE.
    Thanks JH.❤️‍🔥

  • @IndyAdvant
    @IndyAdvant ปีที่แล้ว

    Absolutely amazing, thank you John!!

  • @ScottPlude
    @ScottPlude ปีที่แล้ว +3

    I'm still trying to process the three DNS powershell scripts that you analyzed recently. Watching you slice and dice those scripts was INSANE! Now I need to figure out how to get a text message when you create new content so I can pull my car to the side of the road and watch your stuff the second it comes out!

  • @N0TZ3R0
    @N0TZ3R0 ปีที่แล้ว

    Awesome, wanna c more, keep up the good work

  • @morre1267
    @morre1267 ปีที่แล้ว +1

    Please make a series about firmware analysis and bug hunting! Absolut cool stuff and would love to learn more about it!

  • @DDBAA24
    @DDBAA24 ปีที่แล้ว +1

    Being able to push out a bad firmware update to networked devices, takes a lot of patience but if you like that type of thing... Router firmware typically is a small file, just getting familiar with that can be fun too. Knowing how to modify and package 'bad code' is another whole skill-set. Printers are also fun, PRET helps with that, a bit of an older tool now too. They never patch , smart devices are lucky if they get one update 2 tops before its forgotten and forever vulnerable. I'd keep the hardware part, and software separate if its a topic you are going to spend time on. I'd be happy to see you go through it lol , make my brain itch.

  • @infinix_6586
    @infinix_6586 ปีที่แล้ว +1

    😊Lots of love from Nepal..!❤

  • @Grimeister
    @Grimeister ปีที่แล้ว +8

    *Whenever you make a video it is always helpful and I get to learn something new!*

  • @chipko
    @chipko ปีที่แล้ว

    I'll catch up on this on tiktok ;) seriously though. Thanks for all you do John!

  • @list1726
    @list1726 ปีที่แล้ว

    Thanks for posting

  • @VSteam81
    @VSteam81 ปีที่แล้ว +7

    Amazing. Might have to talk to my dad about changing our wifi password tho

  • @sk9la
    @sk9la ปีที่แล้ว

    I hope to see more similar content for hardware hacking

  • @RadicalGaming1000
    @RadicalGaming1000 ปีที่แล้ว +1

    Woah BugProve looks cool

  • @shadewizard
    @shadewizard ปีที่แล้ว

    you're the only youtuber whose videos i have to slow down.

  • @CGodigitalize
    @CGodigitalize ปีที่แล้ว

    You Are The Best

  • @_hackwell
    @_hackwell ปีที่แล้ว

    Kavigihan is also a very good box creator on HTB 😉 Hi Kavi !

  • @CZghost
    @CZghost ปีที่แล้ว

    That would be pretty interesting. Opening a firmware to a forrest camera, and finding a bunch of stuff there.

  • @bipolartorecovery1485
    @bipolartorecovery1485 ปีที่แล้ว +2

    Hey, there's this guy called save it for parts and basically he hacks hardware and firmware for just about anything, including reading satellites. Would think it would be pretty awesome for someone who's on the software side to team up with someone on the hardware side to do some bad ass hacks, ya know... for education and cuz people be broke... and omg cables be pricey

  • @johnpeterson3905
    @johnpeterson3905 ปีที่แล้ว +2

    I see quite a few people upset cause its sponsored content so just wanted to come down here and say i thought the video was awesome. It brings to light an attac vector people often overlook and shows off a dope tool in the process.
    Keep up the good work brother!

    • @xhivo97
      @xhivo97 7 วันที่ผ่านมา

      Ironically this video is seeding an attack vector. Consider the false sense of security this video provides to the viewers.
      Security research is really fricking hard, these tools don't really help other than maybe give false sense of security or just make things way worse by amateurs using it to spam repositories with bogus CVEs.

  • @stefan3816
    @stefan3816 ปีที่แล้ว +1

    I used telnet to connect to my router and netcat to dump all files and memory.

  • @incog88
    @incog88 ปีที่แล้ว +7

    this ad for this video is longer than the content

    • @KamilUrbanskiStudio
      @KamilUrbanskiStudio ปีที่แล้ว +2

      yeah, John has done that before for example about some laptop. I was thinking maybe he'll show some reversing but no the whole video is just an ad.

    • @ancestrall794
      @ancestrall794 ปีที่แล้ว

      Well thanks for writing this because TH-cam Vanced skips sponsorships and I was wondering why it skiped half of the video (litterally)
      I was starting to get disappointed by the app but since you're saying that it really was a sponsorship then I guess it's normal

  • @opinformation2233
    @opinformation2233 ปีที่แล้ว +2

    Pls show us how to use esp32 to manuclipate networks

  • @aspirohk3558
    @aspirohk3558 ปีที่แล้ว

    Any link to binwalk or those tool developers like if the utility of the tools are usually this bit intense what about the tools creat? 😲😲😲😲

  • @DaxyGamer
    @DaxyGamer ปีที่แล้ว +3

    1:25 not using ublock origin?😜

  • @sudoer92
    @sudoer92 ปีที่แล้ว

    If Jhon said " i don't know... " he's going to master the it😊👋

  • @FlippinFingers
    @FlippinFingers ปีที่แล้ว

    Nice

  • @Devilstory77
    @Devilstory77 ปีที่แล้ว

    ❤❤Super ❤❤❤❤

  • @uramasenju1598
    @uramasenju1598 ปีที่แล้ว

    BugProve doesn't work for my embedded devices, but the idea is awesome.

  • @adeniranm7647
    @adeniranm7647 ปีที่แล้ว

    Pretty fun commercial.

  • @AhmedDeedatPalestine
    @AhmedDeedatPalestine 9 หลายเดือนก่อน

    The guy's vocabulary burst 50 nerves in less than 1ns.

  • @JontheRippa
    @JontheRippa ปีที่แล้ว

    👍👍👍👍

  • @janmillerty4528
    @janmillerty4528 ปีที่แล้ว

    Hello 👋

  • @gooniesfan7911
    @gooniesfan7911 ปีที่แล้ว +1

    Entire video was just a sponsored ad for bug prove

  • @tyrojames9937
    @tyrojames9937 ปีที่แล้ว

    😀😀

  • @enadalotaibi8181
    @enadalotaibi8181 ปีที่แล้ว +1

    at least can we see the password?!

  • @Tsukasa1929
    @Tsukasa1929 ปีที่แล้ว +2

    A big sponsor chunk

  • @hackwithprogramming7849
    @hackwithprogramming7849 ปีที่แล้ว

    Openwrt

  • @ethicalmath3963
    @ethicalmath3963 9 หลายเดือนก่อน +1

    not great, just a long form ad lol

  • @RR-hl6zi
    @RR-hl6zi ปีที่แล้ว +3

    A bit of a stinker, John. You're normally not one to sucker viewers into videos that are basically an ad. It'd be great if you can hint to videos being ads in the title or image.

  • @dedkeny
    @dedkeny ปีที่แล้ว

    second

  • @silviocorrea25
    @silviocorrea25 ปีที่แล้ว +1

    First

    • @iWhacko
      @iWhacko ปีที่แล้ว

      fuck :P

  • @P-G-77
    @P-G-77 ปีที่แล้ว

    My GOD... TP-LINK in certain cases... leave me... open mouth.

  • @xhivo97
    @xhivo97 7 วันที่ผ่านมา

    TL;DR be weary of people promising easy buttons, there ain't no such thing...
    I vomited at that sponsor.
    There's a lot of bogus CVE claims and such automation tools presented as a solution is harmful to security in my opinion.
    Security is hard, this could easily give someone who doesn't know much about it a false sense of security which in itself is bad and should be presented with those caveats mentioned rather than as a good tool.

    • @attilaszasz-mb2sj
      @attilaszasz-mb2sj 2 วันที่ผ่านมา

      We understand that security is complex and there are no easy solutions. BugProve is designed to assist security professionals by automating repetitive tasks, not to replace them. We take CVE claims seriously and strive to minimize false positives. Our goal is to educate users about the tool's limitations, ensuring it complements a broader security strategy.
      Program analysis and automated vulnerability discovery are challenging, so some false positives are unavoidable. However, static analysis techniques like abstract interpretation and data flow analysis are well-regarded in academia for their effectiveness, despite their limitations. These methods help optimize and secure systems and are indispensable in many safety-critical domains such as aerospace and defense.
      In less safety-critical domains, such as IoT, budget constraints have often left end-user and consumer security risks overlooked, creating a false sense of security. We're working to change that by equipping embedded developers and product security engineers with powerful tools to tackle these challenges. While we prioritize delivering an easy-to-use experience, we emphasize that maintaining a mature secure software development cycle, vulnerability management process, and secure coding practices in C and C++ is not easy.
      We value your concerns and are committed to transparency and continuous improvement. I hope this addresses some of your concerns.
      Best regards,
      Attila, BugProve

  • @jordan15308
    @jordan15308 ปีที่แล้ว

    Nice