Unnamed Reverse Engineering Podcast

051 - Collecting Students With Similar Names

10.05.2021 - By Jen Costillo and Alvaro PrietoPlay

Download our free app to listen on your phone

Download on the App StoreGet it on Google Play

Our guest, Jiska Classen (@naehrdine) is  a security researcher at University of Darmstadt (why, yes you can specialize in Security here) and focuses  on reverse engineering wireless things. She is a speaker at this year’s  Hardwear.io. We did a deep dive on ROM patches on Broadcom chips. You'll want to listen to this episode if you are thinking about using iOS devices for your reversing. https://github.com/seemoo-lab/frankenstein (Jan Ruge) https://github.com/seemoo-lab/internalblue (Dennis Mantz) - not be confused for eternal blue. Nexmon --- Nexus monitor wifi https://github.com/seemoo-lab/nexmon  https://github.com/seemoo-lab/polypyus (Jan Friebertshäuser) Thumbs up - ARM function identification ​​https://karta.readthedocs.io/en/latest/Thumbs%20Up.html  Checkra1n - bootloader to jailbreak on iOS. https://checkra.in/    ToothPicker (Dennis Heinze, aka Dennis #2*) https://github.com/seemoo-lab/toothpicker  fpicker - Another/2 Dennis (Dennis Heinze) https://github.com/ttdennis/fpicker  Xnuspy    https://github.com/jsherman212/xnuspy  Frida objection https://github.com/sensepost/objection  “funniest fuzzer  ever wrote” (ComCenter but this has the parsing guts) Obligatory video of AirTechno on AirTag. AirGuard - android air tag app. https://github.com/seemoo-lab/airguard  * Sorry Dennis. You were just the second Dennis in this interview. Certainly this doesn’t reflect upon you as a person or a professional.

More episodes from Unnamed Reverse Engineering Podcast