Abstract
In the preceding chapters, you learned about the attacking of IoT devices using hardware and embedded exploitation techniques. This chapter focuses on the firmware exploitation with which we can exploit the device.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Aditya Gupta
About this chapter
Cite this chapter
Gupta, A. (2019). Firmware Reverse Engineering and Exploitation. In: The IoT Hacker's Handbook. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-4300-8_7
Download citation
DOI: https://doi.org/10.1007/978-1-4842-4300-8_7
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-4299-5
Online ISBN: 978-1-4842-4300-8
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books