Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the methodology for vulnerability hunting in undocumented server components through this 51-minute Black Hat conference talk. Delve into the process of mapping paths laid out in binary firmware images and discover how tracking interactions between software, hardware, and intermediary elements exposes permeable or missing security controls. Learn about PoC helper libraries and chaining useful primitives to unlock new avenues of exploration in server compromise. Presented by Nathan Keltner and Dionysus Blazakis, this talk offers insights into modern techniques for charting the course of server vulnerabilities.