28.05.2016 Views

CLOSING KEYNOTE

D2T2%20-%20Peter%20blasty%20Geissler%20-%20Breaking%20Naive%20ESSID%20WPA2%20Key%20Generation%20Algorithms

D2T2%20-%20Peter%20blasty%20Geissler%20-%20Breaking%20Naive%20ESSID%20WPA2%20Key%20Generation%20Algorithms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

IN STICKERS WE TRUST - BLASTY @ HITBAMS2016<br />

DUMPING NAND FLASH<br />

▸ We can automate a series of POKEs to upload a<br />

‘shellcode’ to memory.<br />

▸ Afterwards we can trigger the ‘Jump to address’ option in<br />

the menu to execute our shellcode.<br />

▸ With a bit of massaging a crosscompiler can be used and<br />

we can write this in good old C instead of ASM.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!