Critical Thinking - Bug Bounty Podcast

Episode 22: Chipping Away at Hardware Hacking

Jun 8, 2023
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 2min
2
The Depreciation of XSS Vectors
01:48 • 2min
3
XSS in SVG
03:23 • 2min
4
The Importance of Knowledge Sharing in Hacking
05:10 • 3min
5
The Move It Vulnerability
07:52 • 2min
6
How to Protect Your Organization From Exploitation
10:04 • 2min
7
How to Know When It Is Time to Cut Bait and Move On
12:27 • 3min
8
Moving Away From the Block Wall
15:36 • 4min
9
How to Find Your First Bug Bounty
19:32 • 4min
10
How to Read Off of an MMC Chip While It's in Use
23:20 • 3min
11
How to Verify a Chip's Voltage and Ground Pin
26:17 • 3min
12
The Importance of Logic Analyzers in Hardware Hacking
29:42 • 3min
13
The Bounties of Hardware Hacking
32:29 • 3min
14
How to Stop Hacking and Move On
35:08 • 2min
15
The Importance of Replay Protected Memory Blocks
37:38 • 2min
16
How to Get a CPU to Function Normally
39:14 • 1min
17
The Importance of a Hot Air Station
40:42 • 2min
18
The Basics of a Hot Air Rework Station
42:31 • 4min
19
How to Use a Hot Air Gun to Heat a Chip
46:12 • 3min
20
How to Heat a Chip
48:54 • 3min
21
How to Reflow a Soldering Iron
51:54 • 2min
22
How to Clean a Chip
53:40 • 2min
23
The All Socket BGA EMMC Reader
55:32 • 3min
24
The T56 Is a Great Device for NAND Flashes
58:04 • 2min
25
How to Hack a Chip
59:36 • 3min
26
How to Use an MMC Controller to Read Data Partitions on Your Device
01:02:09 • 3min
27
How to Stop an Encrypted Partition
01:05:05 • 2min
28
How a Hardware Hacker Glitched a Chip
01:06:38 • 2min
29
Hardware Hacking: A Baby's First
01:08:13 • 2min
30
The Security Risk of a Decrypted Partition
01:09:51 • 2min