Have you ever wanted to test how secure your IoT devices or routers are, but didn’t know where to begin? Do you lack the knowledge to troubleshoot hardware hacking problems? Did your Internet resources lack the “how to” hands-on instruction?
Wouldn’t it be nice if someone could take you by the hand and guide you through the process answering any questions along the way?
Well the search is over because we have developed an embedded device exploitation course to do just that! Bring your laptop! We will walk through a basic vulnerability research process for a SoHo Router all the way to writing your own exploit.
Fundamental Embedded Hardware Concepts * Basic electronics and circuit analysis * Identify components and pins*
Establishing a Connection * JTAG/UART pins * Serial shell * Introspection * Firmware * Identifying protocols *
Fuzzing * What is fuzzing * How to fuzz * Why fuzz *
Crash Triage * What happened * Dynamic Debugging * Find a Bug *
Writing an Exploit * ROP chains * Remote Code Execution *
You can expect to use python 3, wireshark, gdb, ghidra, linux command line, and read mips assembly
Instructor Bios Instructors Paker Dhan, Marvin Leister, Alex Bickalew, and Seth Burchell specialize in embedded systems reverse engineering and analysis, with a combined experience of over 12 years in the industry