Dark Mentor LLC
Dark Mentor LLC
Home
Training
Publications
Blog
Bluetooth Security Timeline
PC/Server Firmware Security Timeline
Linux
Bluetooth reconnaissance with Blue2thprinting
1 day class covering how to use the
Blue2thprinting
software to perform reconnaissance on devices, and understand vulnerabilities they may have.
Xeno Kovah
RISC-V Assembly
3 day class covering RISC-V RV32I/RV64I assembly, including the “M” extensions. Class is built on Linux with a QEMU RISC-V emulated environment, with code debugged by GDB. Option also exists to use real RISC-V hardware. Option also exists to use Ghidra Software Reverse Engineering (SRE) tool as a debugger.
Xeno Kovah
Intel x86-64 Firmware Attack & Defense
2 day class covering Intel x86-64 firmware. Class is focused on exploring the baseline security mechanisms provided by Intel to protect the Serial Peripheral Interface (SPI) flash chip where the Unified Extensible Firmware Interface (UEFI) Basic Input Output System (BIOS) is stored on modern systems.
Xeno Kovah
Intel x86-64 Assembly
3 day class covering Intel x86-64 assembly. Includes options to run with Windows and WinDbg or Linux and GDB. Option also exists to use Ghidra Software Reverse Engineering (SRE) tool as a debugger.
Xeno Kovah
Cite
×