Marc-andre Labonte

Marc-andre Labonte was a system administrator for more than a decade at the McGill Genome Center while it was known as the McGill University and Genome Quebec Innovation Center.

Then, he joined the ETTIC team at Desjardins in 2016 as infrastructure penetration tester. Currently doing vulnerability research on IOT devices, he also presented "Automated contact tracing experiment on ESP Vroom32" workshop at NSEC in 2021. His work is motivated by curiosity and a strong sense of personal privacy.


Your twitter or other social network

https://github.com/Marc-andreLabonte

Which country are you from?

Canada


Session

10-18
13:00
120min
Baremetal emulation
Marc-andre Labonte

Ever wanted to make a CPU says Hello world? Or figure how a driver to communicate with hardware? Or how to reverse engineer a bootloader? Then this workshop is for you.

The ultimate goal of this workshop is to make participants understand how they could emulate and debug binaries which runs directly on a CPU, without an underlying operating system. Good examples of such binaries are bootloaders and the kernel of the operating system itself.

To this end, this workshop propose the following:

  • Install a cross compiler toolchain and compile the Qemu emulator from source code.
  • Try code samples with our compiled Qemu
  • Modify these samples to make them work on different machine types
  • Solve CTF challenge with static and dynamic analysis of a more complex binary using Qemu's debugging capabilities.
Hardware/IoT
Track 3 (205AB)