Skip to main content

To do list

Done:
#

  • Write posts about previous projects
  • Create a Linux rootkit
  • Create a Windows malware (Horrible task, but I did it)
  • Create a U-Boot Secure Boot bypass lab

To do:
#

  • Be fluent in ARM64 assembly
  • Reverse engineer a real hardware device (probably a router or a smart TV)
  • Reverse more in general
  • Learn more about hardware security (side channels, fault injection, etc.)
  • Create a PCIe DMA attack lab (with an FPGA card, using PCILeech for example)

Future projects:
#

  • Host an open source IA to help with reverse engineering and hardware security. Current idea is to make a plugin in Ghidra that can be used to automatically rename functions, variables, etc. based on the context and the code. It would be a great help for reverse engineers and security researchers. (Obviously, this has already been done, but I want to make my own version to hold my own data and to have a better understanding of how it works)

  • Create a custom meta-layer containing all the tools an ethical hacker needs to do their job. The attacker would simply have to flash the output of the Yocto build on a custom board (probably a Raspberry Pi) and would have all the tools they need to do their job. The meta-layer would contain tools to attack networks, hardware, software, etc. It would be a great help for ethical hackers and security researchers. (This is a long term project, but I think it would be really cool to have a custom meta-layer capable of developing modular embedded firmware, tailorable to an attacker’s specific requirements and tactical needs)