by Nick Galloway
Today we are releasing several new challenges for the embedded security CTF, Microcorruption. These challenges highlight types of vulnerabilities that NCC Group’s Hardware and Embedded Systems practice have discovered in real products. The new challenges provide a simple interface to explore these vulnerabilities without having to wire up real hardware and without having to deconstruct large complex systems. The Vancouver level will let you brush up on your MSP430 assembly. The Cold Lake and Churchill levels will let you discover and exploit some bootloader-based vulnerabilities we have discovered in the past. Finally, we’ll just let you discover Baku’s secrets on your own. We hope you enjoy these as much as we enjoy discovering vulnerabilities for our clients.
Published by Jennifer Fernick
Jennifer Fernick is the Global Head of Research at NCC Group. She can be found on Twitter at @enjenneer. View all posts by Jennifer Fernick
Published