Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

JTAGsploitation - 5 Wires, 5 Ways to Root

44CON Information Security Conference via YouTube

Overview

This course teaches learners how to exploit JTAG interfaces for rooting devices using various techniques. The course covers topics such as accessing non-volatile storage, memory analysis, boot patching, and kernel function identification. The teaching method includes demonstrations and practical examples. This course is intended for individuals interested in information security and device rooting techniques.

Syllabus

Intro
Speaker Bio
Physical Layer: Test Access Port
Data Link: TAP FSM
Transport Layer: Target-Specific
JTAG on the Beaglebone Black
Boundary Scan on the BBB
Access Non-Volatile Storage
Run Control
Memory Access
Simple Memory Analysis
Advanced Memory Analysis
Memory Scraping & Analysis
Boot Arguments
Boot Patch
Linux File System ACL Enforcement
Locating Kernel Functions
Identifying Patch Point
Delivery Options
Kernel Patch
getty Parameters
Searching Memory
Patch a Process
Summary

Taught by

44CON Information Security Conference

Reviews

Start your review of JTAGsploitation - 5 Wires, 5 Ways to Root

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.