Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Remote Code Execution via MIDI Messages

DEFCONConference via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore hardware reverse engineering techniques through a fascinating case study of exploiting MIDI protocol vulnerabilities in this 39-minute conference talk. Learn fundamental hardware hacking concepts including JTAG and UART interfaces and their applications in compromising modern digital devices. Discover how to dump firmware from a Yamaha music keyboard and uncover a backdoor within its MIDI implementation that enables remote code execution. Follow along as the presenter demonstrates exploiting this vulnerability to display the famous "Bad Apple" video on the keyboard's dot matrix LCD, revealing how seemingly innocent audio protocols can be weaponized beyond their original design intentions. Gain insights into the intersection of audio technology and cybersecurity while understanding how hardware reverse engineering can expose unexpected attack vectors in consumer electronics.

Syllabus

DEF CON 33 - Remote code execution via MIDI messages - Anna Antonenko

Taught by

DEFCONConference

Reviews

Start your review of Remote Code Execution via MIDI Messages

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.