Exploiting Meshtastic and C++ Binaries - Binary Ninja Live Stream
Can you trust your messages? Brandon, who's teaching the Firmware course at RE//verse, will be showing off a bug he found in a messaging app that works with Meshtastic devices. Afterwards, we'll continue more C++ reversing and some other complex CTF challenges. Join Brandon's firmware class to learn more about exploiting devices like these: https://shop.binary.ninja/collections/re-verse-admissions-requires-sales-tax/products/re-verse-2026-firmware Get your tickets for RE//verse before they run out! https://re-verse.io/ Try Binary Ninja: https://binary.ninja/demo/ Check out Sidekick at https://sidekick.binary.ninja/ Slack: https://slack.binary.ninja/ Twitter: https://twitter.com/vector35 Mastodon: https://infosec.exchange/@binaryninja Bluesky: https://bsky.app/profile/binary.ninja [00:00:00] Pre-Stream [00:04:03] Intro [00:04:27] Introducing Brandon Miller and Firmware @ RE//verse [00:07:32] Meshtastic Explainer [00:12:31] Meshtastic Messaging Bug [00:16:40] Off-by-one Bug [00:24:08] Analyzing Memory-Mapped Hardware Devices [00:29:55] Hexagon/DSP [00:35:56] TMS320C6x [00:52:00] Profiles Demo [01:01:29] Stripped C++ Reversing [03:28:20] Post-Stream
Download
0 formatsNo download links available.