A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Reverse Engineering Network Device APIs - Dan Nagle (@NagleCode) (BSides Huntsville 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)

Reverse Engineering Network Device APIs
Dan Nagle (@NagleCode)

This presentation is a live demonstration on how to use Packet Sender plus Wireshark to reverse engineer a black box networked device ( -- for this demonstration, a Raspberry Pi running custom TCP and UDP servers). The goal is to bypass the device's original software. After the box's capabilities are acquired, it can then be extended by Packet Sender. During the demonstration, broader ideas with regards to network programming will be discussed. Anybody who is interested in software development is highly encouraged to attend.

Bio: Dan Nagle is a senior software engineer for SVSi writing control software and web interfaces for network devices distributing HD video over computer networks. He has written apps for Android, Windows, Mac, Linux, iOS, numerous web apps, network servers, and pure embedded C. He is the author of the book "HTML5 Game Engines" published by CRC Press. He is the author and inventor of Packet Sender, a cross-platform packet-generation and network test utility. He has also been published in Net, a London-based magazine about web development.

Back to BSides Huntsville 2015 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast