You are viewing a single comment's thread from:

RE: LeoThread 2024-11-17 10:12

in LeoFinance6 days ago

Part 3/3:

The speaker explores the limited shell, finding various libraries and features, including an encryption cipher, which suggests that the device may have some security measures in place. They also discover a way to dump the device's physical memory, which could potentially be used to extract the firmware for further analysis.

Conclusion and Next Steps

The speaker concludes the video by promising to continue the investigation in the next video, where they will attempt to extract the firmware from the device's memory, either through the console or by directly accessing the flash chip. They encourage viewers to watch the next video, as it promises to be an exciting continuation of the security audit.