In this chapter, we took a quick journey into basic embedded systems and their architecture, and we learned about different types of firmwares, bootloaders, UART, radio sniffing, and common tools that can be utilized during a hardware hacking. We also learned how to unpack a firmware and load a new firmware on a router using USBJtag NT, and we explored using RouterSploit to identify the specific vulnerabilities in the embedded devices. Finally, we learned how to clone a physical RFID/NFC card using a Chameleon Mini, which can be utilized during red teaming exercises.
We hope this book has helped you to understand the fundamental risks and how attackers use these tools to compromise networks/devices within a few seconds, and how you can use the same tools and techniques to understand your infrastructure vulnerabilities, as well as the importance of remediation and patch...