Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Introduction
00:00 • 2min
The Depreciation of XSS Vectors
01:48 • 2min
XSS in SVG
03:23 • 2min
The Importance of Knowledge Sharing in Hacking
05:10 • 3min
The Move It Vulnerability
07:52 • 2min
How to Protect Your Organization From Exploitation
10:04 • 2min
How to Know When It Is Time to Cut Bait and Move On
12:27 • 3min
Moving Away From the Block Wall
15:36 • 4min
How to Find Your First Bug Bounty
19:32 • 4min
How to Read Off of an MMC Chip While It's in Use
23:20 • 3min
How to Verify a Chip's Voltage and Ground Pin
26:17 • 3min
The Importance of Logic Analyzers in Hardware Hacking
29:42 • 3min
The Bounties of Hardware Hacking
32:29 • 3min
How to Stop Hacking and Move On
35:08 • 2min
The Importance of Replay Protected Memory Blocks
37:38 • 2min
How to Get a CPU to Function Normally
39:14 • 1min
The Importance of a Hot Air Station
40:42 • 2min
The Basics of a Hot Air Rework Station
42:31 • 4min
How to Use a Hot Air Gun to Heat a Chip
46:12 • 3min
How to Heat a Chip
48:54 • 3min
How to Reflow a Soldering Iron
51:54 • 2min
How to Clean a Chip
53:40 • 2min
The All Socket BGA EMMC Reader
55:32 • 3min
The T56 Is a Great Device for NAND Flashes
58:04 • 2min
How to Hack a Chip
59:36 • 3min
How to Use an MMC Controller to Read Data Partitions on Your Device
01:02:09 • 3min
How to Stop an Encrypted Partition
01:05:05 • 2min
How a Hardware Hacker Glitched a Chip
01:06:38 • 2min
Hardware Hacking: A Baby's First
01:08:13 • 2min
The Security Risk of a Decrypted Partition
01:09:51 • 2min


