28c3: Reverse Engineering USB Devices

  Рет қаралды 22,606

28c3

28c3

Күн бұрын

Пікірлер: 10
@garinbircsak3592
@garinbircsak3592 4 жыл бұрын
I can't believe that there were not more reverse engineering comments considering the number of years since your talk. Life has gotten much more complicated and being able to figure some other's approach and perhaps improve it is very important. Yes, we need better automatic collaborative tools. Nice effort and talk!
@TonyMach01
@TonyMach01 12 жыл бұрын
A geek with a sense of humor. Dear lord indeed.
@nostalgeek2872
@nostalgeek2872 2 жыл бұрын
Hello everyone ! Beginner user of our favorite software Wireshark to analyze USB communications, for practical reasons I would like to know how to save the "payload" in the capture file, excluding the USB protocol layers (tokens, PID, handshake ... among other packaging data). I'm using Linux Mint and my skills about programming ang compilating are very very poor. Thanks for your help.
@UseLogicPlease123
@UseLogicPlease123 12 жыл бұрын
Sounds nice.... but what happens when your dealing with encrypted data streams? As speeds of buses and processors increase, the overhead of data encryption becomes negligible and it prevents people from reverse engineering your drivers and selling equivalent products. I fear this approach only works in certain cases. Very nice video though. Would be nice to hear some more lectures about USB basics.
@chrisw1462
@chrisw1462 3 жыл бұрын
Thanks for posting the video in a resolution that makes reading the data on some screens impossible.
@gayusschwulius8490
@gayusschwulius8490 3 жыл бұрын
You only have to click the link in the subscription to get a higher resolution. Back in 2011, more than 480p wasn't possible with KZbin.
@norbertmakula4356
@norbertmakula4356 5 жыл бұрын
I need that jumper
@TehAnyKey
@TehAnyKey 13 жыл бұрын
Great talk!
@BracedPoleCat
@BracedPoleCat 13 жыл бұрын
*reads hoodie* apeture science... dear lord
@717Fang
@717Fang 4 жыл бұрын
Openvizla is already works 10 years on this project. its shame!
Reverse Engineering a USB Device (Element14)
19:50
Amy Worrall
Рет қаралды 7 М.
USB: From Introduction to Rapid Development
29:17
Texas Instruments
Рет қаралды 19 М.
Мясо вегана? 🧐 @Whatthefshow
01:01
История одного вокалиста
Рет қаралды 7 МЛН
Quando A Diferença De Altura É Muito Grande 😲😂
00:12
Mari Maria
Рет қаралды 45 МЛН
1% vs 100% #beatbox #tiktok
01:10
BeatboxJCOP
Рет қаралды 67 МЛН
Support each other🤝
00:31
ISSEI / いっせい
Рет қаралды 81 МЛН
28C3 - reverse engineering usb devices
26:03
HackersOnBoard
Рет қаралды 37 М.
Reading Silicon: How to Reverse Engineer Integrated Circuits
31:52
27c3: USB and libusb (en)
56:04
Christiaan008
Рет қаралды 14 М.
28c3: Behind the scenes of a C64 demo
1:03:13
28c3
Рет қаралды 71 М.
Introduction to Firmware Reversing
11:32
Tony Gambacorta
Рет қаралды 314 М.
Intro to Hardware Reversing: Finding a UART and getting a shell
12:07
Tony Gambacorta
Рет қаралды 909 М.
SparkFun Engineering Roundtable 11-12-12: HID and USB Devices with Chris Taylor
17:45
Bare-metal ARM firmware reverse engineering with Ghidra and SVD-Loader
14:40
Мясо вегана? 🧐 @Whatthefshow
01:01
История одного вокалиста
Рет қаралды 7 МЛН