Firmware Extraction and Analysis on Embedded IoT Devices
A practical walkthrough of dumping firmware from common IoT devices using SPI and UART interfaces, followed by static analysis techniques for identifying vulnerabilities in stripped binaries.
March 14, 2026 · Melbourne, Australia
mohs8con features talks from members of our community. Remember: networking is the primary focus. Talks are designed to spark conversation, not replace it.
A practical walkthrough of dumping firmware from common IoT devices using SPI and UART interfaces, followed by static analysis techniques for identifying vulnerabilities in stripped binaries.
Effective reconnaissance methodologies for bug bounty programs. Covers asset discovery, subdomain enumeration, and fingerprinting techniques that consistently lead to critical findings.
Exploring common vulnerabilities in BLE device pairing, GATT services, and authentication mechanisms. Includes live demonstration of sniffing and replay attacks against consumer hardware.
An introduction to automotive security research focusing on CAN bus analysis, ECU firmware reverse engineering, and the challenges of working with proprietary protocols in modern vehicles.
Deep dive into current heap exploitation methods on glibc, covering tcache poisoning, safe-linking bypasses, and practical approaches to developing reliable exploits in hardened environments.
Getting started with hardware security research using affordable tools. Covers logic analysers, JTAG debugging, fault injection basics, and building a practical home lab for under $500.