From 7e4a9f9e90cf4b9beb1c32a809d985dbf8a535a1 Mon Sep 17 00:00:00 2001 From: nihalpasham Date: Thu, 10 Mar 2022 15:26:36 +0530 Subject: [PATCH] readme updates --- src/README.md | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/src/README.md b/src/README.md index 41cebc8..1b157b6 100644 --- a/src/README.md +++ b/src/README.md @@ -22,11 +22,12 @@ Open-source bootloaders have a large trusted computing base i.e. they (pretty mu - support for every possible filesystem you can think of.   - and more stuff. -> **Note:** This includes [`U-boot`][uboot], the de-facto standard in the embedded-systems world. Here's a mental map of Uboot's potential attack surface. -> -> [![mental_map_uboot_attack_surface](https://github.com/imrank03/rustBoot-book-diagrams/blob/main/Mental_map.svg?raw=true "mental_map_uboot_attack_surface")](https://github.com/imrank03/rustBoot-book-diagrams/blob/main/Mental_map.svg?raw=true) -> -> - *[`DepthCharge`][depthcharge] is a U-Boot hacking toolkit for security researchers and tinkerers.* +> **Note:** This includes [`U-boot`][uboot], the de-facto standard in the embedded-systems world. [`DepthCharge`][depthcharge] is an example of a U-Boot hacking toolkit for security researchers and tinkerers, designed to exploit U-boot's large attack surface. + +![mental_map_uboot_attack_surface](https://raw.githubusercontent.com/imrank03/rustBoot-book-diagrams/main/Mental_map.svg?raw=true) + +[uboot]: https://github.com/u-boot/u-boot +[depthcharge]: https://github.com/nccgroup/depthcharge [uboot]: https://github.com/u-boot/u-boot [depthcharge]: https://github.com/nccgroup/depthcharge