Live, Hands-On Embedded Firmware Security Training in IoT Firmware Exploitation, Hardware Hacking and Exploiting Real Time Operating Systems
Here's a quick summary of the classes taught by former US intelligence offensive cyber operators, who show students how to make securing embedded firmware (and jumping out of planes) look easy!
The IoT Firmware Exploitation course is designed for white hat hackers, tinkerers and hobbyists with limited experience and an interest in embedded systems analysis. It starts with a basic introduction to electronics, using a series of hands-on lab exercises to give the student a comfortable foundation using various embedded analysis tools and techniques. The exercises include extracting and analyzing flash images from live hardware. Students will learn how to identify and extract critical data in the firmware, and perform basic vulnerability analysis on embedded code.
The course continues with advanced emulation and exploitation techniques against MIPS Linux systems, including stack overflows, return to libc and return oriented programming. Students will develop buffer overflow exploits against live MIPS Linux devices using only a firmware update image - no hardware required!
Finally, the course culminates with students identifying, exploiting and patching 0-day vulnerabilities in a real-world embedded device. At the end of the course, students will have the knowledge and experience to perform hardware and firmware analysis of commercial, off-the-shelf embedded systems.
The Hardware Hacking Workshop takes the hard out of hardware hacking.
This is for people who want to actually understand what they’re doing!
Have you ever wanted to reverse engineer a piece of electronics, but didn’t know where to begin? Do you lack the knowledge to troubleshoot hardware hacking problems? Did your Internet resources lack the “how to” hands-on instruction?
Wouldn’t it be nice if someone could take you by the hand and elevate your hardware reverse engineering knowledge from zero to hero in a logical, well-organized manner?
The Exploiting Real Time Operating Systems course teaches students how to analyze, reverse, debug and exploit embedded RTOS firmware. It provides hands-on experience with a variety of real-world devices, RTOS’s and architectures that equip students with the practical knowledge and skills necessary to be proficient in RTOS vulnerability analysis and exploitation.
For more information or for custom training packages, operators are standing by at 443-276-6990 and email@example.com.