@pancake, he visto una serie de posts que igual te molan...
Empiezan en este: https://maderix.substack.com/p/inside-the-m4-apple-neural-engine
Igual te es útil ;)
| Github | https://github.com/antoniovazquezblanco |
| Languages | GL, ES, EN |
@pancake, he visto una serie de posts que igual te molan...
Empiezan en este: https://maderix.substack.com/p/inside-the-m4-apple-neural-engine
Igual te es útil ;)
Transparency and deep access to IoT hardware. ⚙️🔍 On December 27, @antoniovazquezblanco (@Tarlogic Innovation) will present at #39c3 a reverse engineering research project on the ESP32 chip.
📍 Hamburg
⏰ 13:50–14:30
#Bluetooth
Real ones post their slides before their talk (or at least very shortly thereafter) ;)
Slides & materials for HWIO NL talk later this week:
“Reverse engineering Realtek RTL8761B* Bluetooth chips, to make better Bluetooth security tools & classes”

We hold this truth to be self-evident: SUFFERING BUILDS STRENGTH! In this talk I will walk you through the trials, tribulations, and triumph(!) of the worst debugging setup I've ever hacked together, which I used to reverse engineer the Realtek RTL8761B* family of Bluetooth chips.<p>This work was done because Bluetooth security tools are in an abominable state. We use "CSR4" (Cambridge Silicon Radio) dongles that don't support packets newer than Bluetooth 4.0 (released in 2010!), just to be able to spoof the Bluetooth Device Address (BDADDR) for MitM attacks.<p>Veronica Kovah & I have been creating Bluetooth security classes for <a href="https://ost2.fyi/">OpenSecurityTraining2</a>. And we wanted to use better hardware; ideally something that supports BT 5.4 (released in 2023). So I bought a bunch of cheap dongles off Amazon, and found that most of them used the same RTL8761B chip. So the goal was clear: at a minimum, figure out a way to spoof the BDADDR on these dongles. But I also a set out a nice-to-have stretch goal - to figure out how to use these dongles to send custom LMP packets (which are architecturally not meant to be under full user control.) That way, could replace a bulky and expensive $55 dev board (that is only used for BT Classic), with a cheap and small $14 USB dongle (which has a better antenna to boot!) This would make Blue2thprinting (released at Hardwear.io 2023), and thus Bluetooth reconnaissance & vulnerability assessment, cheaper & better.<p>Bloodied (but not broken) by the ordeal, I achieved my goals and stretch goals. And given that there are no public descriptions of how Realtek Bluetooth chips work, I look forward to sharing hitherto-unknown information about how to navigate and understand these mostly-16-bit-MIPS-code systems. And I'll discuss how their ROM-"patch"ing firmware update mechanism works, how you can patch it to change its code too, and the security implications thereof.
