We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Security

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What is Phlashing?

Mary McMahon
By
Updated: May 16, 2024
Views: 9,560
Share

Phlashing is a technique which can be used to permanently disable hardware by loading a corrupted BIOS onto the hardware. In a simple example of phlashing, a digital camera could be rendered inoperable by destroying the firmware which is used to run the camera. A phlashing demonstration was performed for security professionals in May 2008, illustrating the potential dangers of this technique, although many professionals were skeptical about whether or not phlashing would actually be used in the wild.

This technique relies on the fact that electronics like computers, routers, cameras, scanners, and other peripherals rely on firmware to run, and such firmware needs to be updated periodically. As a result, manufacturers set their equipment up in such a way that it is easy to update the firmware, and in many cases poor security protocols are in place, leaving the electronics vulnerable to attack.

When someone updates the firmware on a device, it is known as “flashing,” and the word “phlashing” is clearly derived from the more legitimate sense of firmware updates. As anyone who has upgraded firmware knows, flashing can be a dicey business, as any interruption in the process can brick the hardware, rendering it inoperable. When something is phlashed, the bricking would be deliberate.

In terms of hacking tools, phlashing isn't terribly effective, unless the goal is to get revenge. Some security professionals have suggested that phlashing could be used by griefers, for example, or by hackers who attempted to bring down a server with a Denial of Service Attack first. Phlashing is sometimes referred to as a “Permanent Denial of Service Attack,” in a reference to this, as the destruction of vital hardware like routers and servers would certainly result in an interruption of service.

Phlashing could also potentially be used to take over a piece of hardware, by updating firmware which allowed for easy remote access. This could create a major security breach, especially if the hardware involved was a server or router, as large amounts of sensitive information passes through servers and routers.

In response to the threat of phlashing, organizations concerned with electronic security have suggested that it may be time to develop less vulnerable firmware to protect consumers and the industry in general.

Share
EasyTechJunkie is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Mary McMahon
By Mary McMahon

Ever since she began contributing to the site several years ago, Mary has embraced the exciting challenge of being a EasyTechJunkie researcher and writer. Mary has a liberal arts degree from Goddard College and spends her free time reading, cooking, and exploring the great outdoors.

Discussion Comments
Mary McMahon
Mary McMahon

Ever since she began contributing to the site several years ago, Mary has embraced the exciting challenge of being a...

Learn more
Share
https://www.easytechjunkie.com/what-is-phlashing.htm
Copy this link
EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.

EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.