DEF CON 24 - 101 Ways to Brick your Hardware
Joe FitzPatrick SecuringHardware.com
Joe Grand (Kingpin) Grand Idea Studio
Spend some time hacking hardware and you'll eventually render a piece of equipment unusable either by accident or intentionally. Between us, we've got decades of bricking experience that we'd like to share. We'll document the most common ways of temporarily or permanently damaging your hardware and ways to recover, if possible. We'll also talk about tips on how to avoid bricking your projects in the first place. If you're getting into hardware hacking and worried about messing something up, our stories will hopefully prevent you from experiencing the same horrors we did. If you're worried about an uprising of intelligent machines, the techniques discussed will help you disable their functionality and keep them down.
Joe FitzPatrick is an Instructor and Researcher at https://SecuringHardware.com. Joe has spent over a decade working on low-level silicon debug, security validation, and hardware penetration testing, and hardware security training. In between training and bricking hardware, Joe is busy developing new course content or working on contributions to the NSA Playset and other misdirected hardware projects.
Twitter: @securelyfitz
Joe Grand also known as Kingpin, is a computer engineer, hardware hacker, former DEF CON badge designer, runner, daddy, honorary doctor, TV host, member of L0pht Heavy Industries, and the proprietor of Grand Idea Studio.
Twitter: @joegrand
Видео DEF CON 24 - 101 Ways to Brick your Hardware канала HackersOnBoard
Joe Grand (Kingpin) Grand Idea Studio
Spend some time hacking hardware and you'll eventually render a piece of equipment unusable either by accident or intentionally. Between us, we've got decades of bricking experience that we'd like to share. We'll document the most common ways of temporarily or permanently damaging your hardware and ways to recover, if possible. We'll also talk about tips on how to avoid bricking your projects in the first place. If you're getting into hardware hacking and worried about messing something up, our stories will hopefully prevent you from experiencing the same horrors we did. If you're worried about an uprising of intelligent machines, the techniques discussed will help you disable their functionality and keep them down.
Joe FitzPatrick is an Instructor and Researcher at https://SecuringHardware.com. Joe has spent over a decade working on low-level silicon debug, security validation, and hardware penetration testing, and hardware security training. In between training and bricking hardware, Joe is busy developing new course content or working on contributions to the NSA Playset and other misdirected hardware projects.
Twitter: @securelyfitz
Joe Grand also known as Kingpin, is a computer engineer, hardware hacker, former DEF CON badge designer, runner, daddy, honorary doctor, TV host, member of L0pht Heavy Industries, and the proprietor of Grand Idea Studio.
Twitter: @joegrand
Видео DEF CON 24 - 101 Ways to Brick your Hardware канала HackersOnBoard
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Writing Bad @$$ Malware For OS X](https://i.ytimg.com/vi/fv4l9yAL2sU/default.jpg)
![Defcon 21 - Doing Bad Things to "Good" Security Appliances](https://i.ytimg.com/vi/XyuwsJJzMDk/default.jpg)
![The NSA Playset: A Year Of Toys And Tools](https://i.ytimg.com/vi/AdeMX6l9qNc/default.jpg)
![DEF CON 24 - Backdooring the Frontdoor](https://i.ytimg.com/vi/oBTl-jCtNDA/default.jpg)
![Tools of NSA playset](https://i.ytimg.com/vi/BOuvnGcvZb4/default.jpg)
![SirenJack: Cracking a 'Secure' Emergency Warning Siren System](https://i.ytimg.com/vi/49KoUmiJuts/default.jpg)
![Security@ 2017 Keynote: Samy Kamkar Hacker and Creator of the MySpace Worm](https://i.ytimg.com/vi/zWsSu5NjZL4/default.jpg)
![DEF CON 27 - Bug Finding And Exploit Techniques On File Transfer App Of All Top Android Vendors](https://i.ytimg.com/vi/9PYYnl0FR1I/default.jpg)
![Deviant Ollam | The Four Types of Locks | SOURCE Conference Boston 2010](https://i.ytimg.com/vi/vxXryID5F7M/default.jpg)
![DEF CON 24 - 101 Sentient Storage - Do SSDs Have a Mind of Their Own?](https://i.ytimg.com/vi/8mYXSoxAOT8/default.jpg)
![DeepSec 2010: The Future of Social Engineering](https://i.ytimg.com/vi/aVIq9mdVHlc/default.jpg)
![What's on the Wireless? Automating RF Signal Identification](https://i.ytimg.com/vi/XNcGhnY_0oI/default.jpg)
![DEF CON 27 - Pedro Cabrera Camara - SDR Against Smart TVs URL and Channel Injection Attacks](https://i.ytimg.com/vi/t8WwRiQyFMI/default.jpg)
![DEFCON 19: The History and the Evolution of Computer Viruses](https://i.ytimg.com/vi/s2g9lgYrYJM/default.jpg)
![Hands-On with the 2018 AND!XOR Unofficial DEF CON Badge](https://i.ytimg.com/vi/fRIJB7pku-E/default.jpg)
![DEF CON 27 - Intro to Embedded Hacking-How you can find a decade old bug in widely deployed devices](https://i.ytimg.com/vi/OW95vw2_BxQ/default.jpg)
![DEF CON 24 - Crypto: State of the Law](https://i.ytimg.com/vi/pKSqWsxUFQw/default.jpg)
![The kernel report](https://i.ytimg.com/vi/yt29BKVfI0I/default.jpg)
![Lies and Damn Lies: Getting Past the Hype of Endpoint Security Solutions](https://i.ytimg.com/vi/3p_7hYXxkXE/default.jpg)
![Writing Viruses for Fun, not Profit](https://i.ytimg.com/vi/2Ra1CCG8Guo/default.jpg)