Publisher's Synopsis
This book offers practical technical information to uncover and fix vulnerabilities caused by misconfiguration or specific corner cases. It includes an introduction to the bootloader and several real-world attacks along with recommendations so developers can mitigate them. It comes with a Virtual Machine (VM) where you can practice proposed exercises. Below is a list of the different sections of the book:
- Introduction: Embedded Booting Flow- Getting to know U-Boot and its specific features
- Attacking and securing the bootloader: 5 practical attacks with their corresponding mitigations
- Post-Exploitation Techniques