Practical IoT Hacking – Unhacked! Edition

When

September 18, 2023 - September 20, 2023    
All Day

Where

DoubleTree by Hilton London - Ealing
2-8 Hanger Ln, London W5 3HN, United Kingdom, United Kingdom

Event Type

Map Unavailable

COURSE HIGHLIGHTS:

– 4 days of hands-on IoT hacking, led by professional trainers experienced in real-world

– A focus on practical IoT Hacking Techniques

– IoT Hacking Kit for all students

COURSE DETAIL

– In-person learning – 20% theory, 80% practical

Day 1 (Before Start – Protocol Day)

  • About IoT
  • Current IoT Vulnerabilities
  • IoT Protocols
    • MQTT
      • About the MQTT
      • Use Cases
      • Exercise: MQTT – 1
      • Exercise: MQTT – 2
      • Exercise: MQTT – 3
    • CoAP
      • About the CoAP
      • Exercise: CoAP – 1
      • Exercise: CoAP – 2
      • Exercise: CoAP – 3

Day 2 ((Hard|Firm)ware Day)

  • Attack Surface Mapping
  • Circuit Analysis of Hardware
    • Exercise: UART Hacking (Enumeration and Exploitation)
    • Exercise: Attack Surface Mapping
    • Exercise: SPI Hacking (Enumeration and Exploitation)
    • Exercise: JTAG Hacking (Enumeration and Exploitation)
    • Exercise: I2C Hacking (Enumeration and Exploitation)
  • About The Firmware
  • How can I obtain a firmware?
  • Firmware Analysis Tools
    • Exercise: Static Firmware Analysis
    • Exercise: Dynamic Firmware Analysis with GDB
    • Exercise: Firmware Emulation with QEMU
    • Exercise: Automation of Firmware Emulation with QEMU
    • Exercise: Exploiting Buffer Overflow CVE Real Word Example
  • About the Side-Channel Attack
    • Exercise: Side-Channel Attack – 1
    • Exercise: Side-Channel Attack – 2
    • Exercise: Side-Channel Attack – 3
    • Exercise: Side-Channel Attack – 4

Day 3 (RF Day)

  • About the BLE
  • BLE Structure
  • BLE Pairing Methods
    • Exercise: BLE Hacking – 1 (Enumeration and Hacking)
    • Exercise: BLE Hacking – 2 (Encrypted Traffic Analysis)
    • Exercise: BLE Hacking – 3 (Pcap Analysis)
  • About the RF
    • Exercise: RF Hacking (Radio Signal Capture, Decode And Analysis)
  • About the Zigbee
  • Zigbee Structure and Communication
    • Exercise: Zigbee Hacking – 1 (Detection, Analysis and Exploitation)
    • Exercise: Zigbee Hacking – 2 (Pcap Analysis)

WHO SHOULD TAKE THIS COURSE

– Penetration testers who want to get into IoT security

– Bug hunters who want to find new bugs in IoT products

– Government officials from defensive or offensive units

– Red team members tasked with compromising the IoT infrastructure

– Security professionals who want to build IoT security skills

– Embedded security enthusiasts

– IoT Developers and testers

– Anyone interested in IoT security

AUDIENCE SKILL LEVEL

Beginner/Intermediate

STUDENT REQUIREMENTS

– Basic knowledge of Linux.

– Basic penetration testing experience is desirable, but not required.

WHAT STUDENTS SHOULD BRING

Each attendee must bring a computer that meets the following requirements:

– 64-bit processor with 64-bit operating system

– VT or other 64-bit virtualization settings enabled in your BIOS to run 64-bit VMs

– At least eight (8) GB of RAM, recommended sixteen (16) GB if possible

– At least fifty (50) GB of free hard drive space

– Intel VT or AMD-V virtualization hardware extensions ENABLED in BIOS

– Windows 10.x installed on your host laptop or inside a VM

– We will use cloud-based Lab’s. Everything in the cloud. For hardware exercises will be use our special ‘IoT Hacking VM’. Therefore, virtualization softwares, must be installed and tested for hardware hacking exercises.

Windows Users: Recent version of VirtualBox is the ONLY option, a version released within the last year. VMware Workstation (Pro or Player) is NOT compatible with one of our hardware components needed on the last day.

Mac Users: Recent version of VirtualBox or VMware Fusion (released within the last year)

Linux Users: Recent version of Gnome Boxes, Libvirt, VirtualBox, or VMware Workstation (released within the last year)

– Access to a local account with administrative permissions that can install software and disable any security services that interferes with course exercises

– Access to and ability to change BIOS settings if needed in class

WHAT STUDENTS WILL BE PROVIDED WITH

The following items (or rough equivalents depending on availability) are provided to each student to use in class and to keep after course completion:
  • CyberPath IoT Hacking Box
    • CyberPath HardKnife (Multi Purpose Hardware Attacking Tool)
    • CyberPath Vulnerable Board for Exercises
    • CyberPath Soldering Board (Five Level)
    • CyberPath HardKnife Slot
  • Other Components
    • Arduino Nano
    • Soldering Iron Kit
    • Multimeter
    • Screwdriver
    • Electronics Kit(Breadboards, Jumpers, etc.)
    • Latest version of the CyberPath IoT Hacking VM
    • BLE
  • Online Materials
    • Exercises Files (Embedded Firmware, BLE, Wifi, Zigbee)
    • Cloud-based IoT Hacking Lab Access (In Training)
    • IoT Hacking Handbook

Book a Seat

The registration & booking are done directly on MomentERA website. Please follow this link.

ABOUT THE TRAINERS

Besim Altınok has been doing research on Wi-Fi security and IoT Security for a long time.
He created the WiPi-Hunter project against Wi-Fi hackers. He is the author of a book on Wi-Fi security. Besim’s studies on wireless security have been published in Arkakapı Magazine and other magazines.
Besim also provided IoT Hacking and other advanced special trainings to the leading companies in the field of telecom
He has also spoken and lectured at top conferences including BlackHat Europe, Blackhat ASIA, Defcon and others.

NJ Ouchn

"Passion is needed for any great work, and for the revolution, passion and audacity are required in big doses"