Reverse Engineering IoT Firmware: Where to Start
IoT firmware reverse engineering: explore how to improve the security of IoT devices based on a practical example of reverse engineering a smart air p...
IoT firmware reverse engineering: explore how to improve the security of IoT devices based on a practical example of reverse engineering a smart air p...
Use the firmware analysis process to automatically identify a microcontroller model you need to work with by analyzing the firmware source code.
Learn when you need to reverse engineer a proprietary file format. Explore three examples of how you can reverse engineer closed file formats.
Try reversing a macOS API to see how reverse engineering can help you integrate an undocumented API into a Swift project.
Learn about the risks of vulnerable routers, common attack vectors, and ways to detect and mitigate vulnerabilities in router firmware.
Explore step-by-step instructions on how to make an Android application debuggable without changing its APK file.
Explore what static and dynamic analysis tools and techniques can be used for software reverse engineering automation.
Learn how LLVM works and how to create an obfuscating pass with it.
In this article, we share our experience in dynamic fuzzing to identify security bugs in such popular image viewers as ACDSee, FastStone Image Viewer...
This article is about discovering vulnerabilities even in closed source software by applying fuzzing testing.
Tell us about your project
Send us a request for proposal! Weโll get back to you with details and estimations.
Book an Exploratory Call
Do not have any specific task for us in mind but our skills seem interesting?
Get a quick Apriorit intro to better understand our team capabilities.
Book time slotContact us