Critical Thinking - Bug Bounty Podcast cover image

Episode 80: Pwn2Own VS H1 Live Hacking Event (feat SinSinology)

Critical Thinking - Bug Bounty Podcast

00:00

Hacking IoT Devices in Competitions

The chapter explores the challenges and strategies involved in hacking IoT devices in competitions, including the acquisition of devices, extracting firmware from chips, and using techniques like glitching and fault injection. It discusses the importance of understanding the attack surface, setting up debuggers, conducting code reviews, and utilizing emulation and snapshot-based fuzzing for vulnerability discovery. The chapter also delves into the differences between targeting web interfaces and lower-level components in IoT devices, highlighting the success rates and strategies employed in live hacking events like Pwn2Own and H1 Live Hacking.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app