Digital Heritage Security, Emulation and Vulnerability Research
Testimonials
Very high quality course, we will use it for internal projects, especially router emulation
The iOS (partial) emulation part with fuzzing is just amazing
Pebble watch emulation, from harnessing to fuzzing and vulnerability discovery was a real deal
The exercise on code coverage and dynamic translation made me understand how a CPU works
Key Features:
- Understand the vulnerability landscape and useful tools such as QEMU and AFL
- Explore use cases to find vulnerabilities and execute unknown firmware
- Create your own firmware emulation and fuzzing environment to discover vulnerabilities
Testimonials in Amazon.com
Having read this book, I was captivated by the author's writing style, which effortlessly combines technical expertise with an engaging narrative. It kept me absorbed throughout, and I found it accessible and enjoyable.
Fernando Luiz Cola
I usually do not write reviews for books. A book is so personal, there are so many reasons why someone is interested in a given content, and so many ways to approach it. But this book was in my read list and when Packt folks approached me asking for an opinion, I thought it was a chance to help both the authors and the interested readers.
Rodrigo Rubira Branco
You can tell a lot of care and forethought went into to writing this book. Lots of interesting background on topics that are hard to pick up in a blogging or reddit format. The tutorials are easy to follow, and leave you at a great place to start your own research and investigations.
D. RinckSecurity Researcher
Well written and easy to understand with plenty of history provided along with practical examples. Multiple tracks are present in the book based on your level of expertise. Great reference and guide.
C