10.08.2015 Views

EXPLOITING EMBEDDED SYSTEMS THE SEQUEL!

Exploitation - CanSecWest

Exploitation - CanSecWest

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Debugging and Reversing• Flash onboard firmware of BDI2000 for target CPU• Set up BDI configuration file:…[TARGET]CPUTYPE ARM946ECLOCK 1 ;JTAG clock (0=Adaptive, 1=8MHz, 2=4MHz, 3=2MHz)ENDIAN LITTLE;memory model (LITTLE | BIG)VECTOR CATCH 0x1f ;catch unhandled exceptionsBREAKMODE SOFT 0xDFFFDFFF ;SOFT or HARD, ARM / Thumb break codeSTARTUP RUNRESET NONECopyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!