See my previous post on What is PKCS#11, why does it suck, and why will you keep using it?
In this video Josh gives a small taste of what you can expect in the Introduction to Hardware Hacking and Reverse Engineering course at Advanced Security. Specifically, he shows the run-time interpreter used to directly PEEK and POKE memory address. Nope, it’s not BASIC, but you are in the ballpark — it’s FORTH.
Josh than shows the benefit of this “modern” language which is used in space probes and the core bitcoin blockchain. With FORTH, we can manipulate the software/hardware interface directly without dealing with fluffy software abstractions. In this environment we can see an immediate result of hardware interaction which is great for the class, but even better when trying to probe new hardware.
For a full list of my available trainings, check out Advanced Security.
For consulting, contact us at Cryptotronix.