Advertisement

Firmware Reverse Engineering and Exploitation

  • Aditya Gupta
Chapter

Abstract

In the preceding chapters, you learned about the attacking of IoT devices using hardware and embedded exploitation techniques. This chapter focuses on the firmware exploitation with which we can exploit the device.

Copyright information

© Aditya Gupta 2019

Authors and Affiliations

  • Aditya Gupta
    • 1
  1. 1.WalnutUSA

Personalised recommendations