Hands-on IoT firmware extraction and flash forensics
Event description
Hands-on IoT firmware extraction and flash forensics
Level of Instruction: Intermediate
Instructed by: Dennis Giese, Braelynn Luedtke
Abstract:
Did you ever wanted to hack an IoT device but did not know how to start? Having UART is nice, but does not help in many cases.
For a complete analysis of an IoT device, it is required to look at the firmware itself. In most cases this means that the firmware, data or encryption keys need to be extracted from the device memory. Many researchers are hesitant to do that as there is a high risk of destroying the device or leaving it in an inoperable state. In this workshop we will look at different flash memory types (EEPROM, SPI flash, NAND flash, eMMC flash) and how to extract the information from them.
We will show that you do not need very expensive hardware to archive your goal and that it is not as complicated as everyone believes. See which tools might be useful for your own lab!
Participants will have the opportunity to work in groups and being provided different kinds of IoT devices (e.g. smart speakers). After a tear-down, you can use different chip-off methods (e.g. Hot air, IR soldering) to remove the flash chip and read it out. Optionally, the tools re-ball and re-solder the IC will be available after the workshop. In the end, each team should have the data and a functional device again.
Bonus: If you brick the device, you can keep the parts as a souvenir or can wear them as badges.
Tickets for good, not greed Humanitix dedicates 100% of profits from booking fees to charity