Dissecting Firmware Images Only Knowing The Target Device

Hardware Reversing Raspberry Pi (not done in this article)


A binary being analyzed by BinaryNinja

Why did I start doing Reverse Engineering and Binary Exploitation?


From: https://0x00sec.org/uploads/default/original/2X/e/e52e1dc9cf922b754575f507d0c9794ed51f47c6.png


From https://olayiwolaayinde.medium.com/why-learn-embedded-systems-87bbf5aafd04


Taking Apart the Motorola E

One of the Motorolla E that we took apart



Image from https://www.sei.cmu.edu/education-outreach/credentials/credential.cfm?customel_datapageid_14047=15129




Ragnar Security

Shielding you from security vulnerabilities!

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store