The objective of the workshop is to learn how to use some powerful but intimidating tools while reverse engineering IOT devices: Angr, Unicorn and Qiling.
The workshop aim to show common use cases for each of these tools and also their limits.
To that end, the workshop will propose the following exercices:
- Decipher XOR encrypted strings with Angr
- Automated buffer overflow exploitation with Angr
- Emulation of arbitrary function or code blocks with Unicorn
- Binary emulation with Qiling
- Complete device emulation after firmware extraction with Renode