Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore nifty tricks and sage advice for writing shellcode on embedded systems in this conference talk from the Hack In The Box Security Conference. Learn time-saving techniques for developing exploits on small embedded devices like smart meters, thermostats, keyboards, and mice. Discover how to create portable ARM shellcode, exploit memory corruption on 8-bit micros, develop embedded exploits without a debugger, and blindly assemble ROP chains without firmware images. Gain insights from Travis Goodspeed, a reverse engineer known for key-extraction exploits and USB hardware emulation tools, as he shares clever strategies for overcoming challenges in embedded system exploitation.