Overview
This course teaches learners how to exploit JTAG interfaces for rooting devices using various techniques. The course covers topics such as accessing non-volatile storage, memory analysis, boot patching, and kernel function identification. The teaching method includes demonstrations and practical examples. This course is intended for individuals interested in information security and device rooting techniques.
Syllabus
Intro
Speaker Bio
Physical Layer: Test Access Port
Data Link: TAP FSM
Transport Layer: Target-Specific
JTAG on the Beaglebone Black
Boundary Scan on the BBB
Access Non-Volatile Storage
Run Control
Memory Access
Simple Memory Analysis
Advanced Memory Analysis
Memory Scraping & Analysis
Boot Arguments
Boot Patch
Linux File System ACL Enforcement
Locating Kernel Functions
Identifying Patch Point
Delivery Options
Kernel Patch
getty Parameters
Searching Memory
Patch a Process
Summary
Taught by
44CON Information Security Conference