Critical Thinking - Bug Bounty Podcast cover image

Episode 80: Pwn2Own VS H1 Live Hacking Event (feat SinSinology)

Critical Thinking - Bug Bounty Podcast

CHAPTER

Hacking IoT Devices in Competitions

The chapter explores the challenges and strategies involved in hacking IoT devices in competitions, including the acquisition of devices, extracting firmware from chips, and using techniques like glitching and fault injection. It discusses the importance of understanding the attack surface, setting up debuggers, conducting code reviews, and utilizing emulation and snapshot-based fuzzing for vulnerability discovery. The chapter also delves into the differences between targeting web interfaces and lower-level components in IoT devices, highlighting the success rates and strategies employed in live hacking events like Pwn2Own and H1 Live Hacking.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner