With currently over 25 Billion devices and a projected 50 billion devices by the end of 2020 deployed in homes, offices, healthcare facilities, vehicles and industrial control systems, this course will put you at the very forefront of Cybersecurity skill sets. This course is open to everyone with a basic understanding of electronics and security principles and seasoned Cybersecurity professionals who want to take their existing methodologies and expand them into the most up-to-date and desired skill set on the market. The skills gained by completing the course will ensure that you are at the bleeding edge of Cybersecurity research today.
This course aims to provide you with the practical skills required to conduct a penetration test in a Hardware/IoT platform. This course is focused on developing practical skills in the areas of IoT penetration testing and IoT forensic. Filled with real-world examples and taught by real-world practitioners, this course will equip you will be knowledge and skills required to perform IoT/Hardware penetration testing. Within this course, you will learn what an IoT/Embedded system is, how it functions, and how to perform various hardware attacks to extract and analyse data. The course is five days in length and uses real-world examples to allow the students to develop a mature understanding of the subject.
The delivery of this course makes use of a blended learning environment that seeks to mentor the students in the development and delivery of their IoT/hardware hacking skills. The basic course pedagogy of the five-day course is a practice-based approach with expert mentoring as the best way to fill this significant skills gap and develop the experience industry needs efficiently.
During this course, the candidate will develop the following essential skills:
• The ability to engage with critical stakeholders and construct and scope/statement of work.
• The ability to analyse a PCB and identify debug ports
• The ability to test debug ports using a variety of technologies
• The ability to extract and manipulate firmware
• The ability to analyse and reverse engineering firmware
Who is the course for?
This course is open to everyone with a basic understanding of electronics and security principles and seasoned Cybersecurity professionals who want to take their existing methodologies and expand them into the most up-to-date and desired skill set on the market. The skills gained by completing the course will ensure that you are at the bleeding edge of Cybersecurity research today.
Each candidate will receive a hardware hacking lab used throughout the course, which will allow them to perform hardware penetration testing exercises. The lab is valued at over £600 and will be sent to the candidates before the commencement of the training. Of course, this is for the candidates to keep and is included in the cost of training.
The contents of the lab include:
Various cables and connectors
DSD USB to TTL (FTDI)
Beagle Bone Black + JTAG
SOC SPI Board
SPI Test IC/Flash
SOC Test Rig
How to Scope and Stage and IoT Hacking/Forensic activity
o User engagement and project management
o Legal and Ethical issues
o PCB analysis and component identification
o Open source analysis
o Threat surface identification
o Managing user expectations and report writing
Basic Electronics for Embedded Systems
o Basic electronics and Integrated Circuit Design
o What is an embedded system and how does it function?
o An introduction to ARM cores and ARM core programming
o Loading and Running an embedded operating system
o The ARM Tool chain and building ARM applications
o GCC and GDB (local and remote debugging)
o Signal Analysis via a logic analyse
o Timing diagrams
o Identifying and Connecting to a UART
o UART programming in Python
SPI and I2C
o Introduction to Flash memory
o SPI and I2C via a logic analyse
o Dumping and Flashing the firmware with SPI and I2C
o Using tool such as Flashrom
o SPI and I2C programming in Python
JTAG from basics to expert
o Identifying JTAG pins
o Validation of JTAG via a logic analyser
o Dumping the memory with JTAG
o Using JTAG and GDB
o Debugging and dumping the memory with GDB
o Using tools such as OpenOCD and GDB
o Types of Embedded operating systems (Linux and Windows)
o Extracting a File System and Types of File Systems (EXT4, NTFS and Squashfs)
o Reverse Engineering ELF and PE binaries/libraries
o Using tools such as radare2, objdump, readelf, nm, hexedit, strings, gcc etc.
o Introduction to ghidra
No hardware hacking experience is required, as this course will take the attendees from zero to hero and provide the theoretical and practical skills needed to assess any embedded software or other IoT device they may encounter.
It is advantageous to have background knowledge in security engineering principles, penetration testing, or other related Cybersecurity activities. It is worth considering attending the Merimetso CyberScheme Team Member (CSTM) course or our Security Engineering Principles course to gain a foundation in Cybersecurity methodology. However, this is not a pre-requisite.