SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Training 2015 - Offensive IoT Exploitation"

Difference between revisions of "Training 2015 - Offensive IoT Exploitation"

From BruCON 2017

Jump to: navigation, search
(Created page with "=Offensive IoT Exploitation= ==Objectives== IoT or the Internet of Things is one of the most upcoming trends in technology as of now. A lot many new devices are coming up eve...")
(No difference)

Revision as of 10:40, 26 May 2015

Offensive IoT Exploitation

Objectives

IoT or the Internet of Things is one of the most upcoming trends in technology as of now. A lot many new devices are coming up every single month. However, not much attention has been paid to the device's security till now. "Offensive IoT Exploitation" is a brand new and unique course which offers pentesters the ability to assess the security of these smart devices. The training will cover assessing IoT attack surfaces and finding security issues. The course will be hands-on giving attendees the ability to try things themselves rather than just watching the slides. We will start from the very beginning discussing about the architecture of IoT devices, and then slowly moving to firmware analysis, identifying attack surface and finding/exploiting vulnerabilities. The course labs include both emulated environments as well as real live devices which will be provided to the attendees during the training for the hands-on labs. Offensive IoT Exploitation training is designed for pentesters who want to kickstart their career in IoT Pentesting and the training does not expect the attendees to have a prior knowledge of assembly, mobile security or reversing.

Course Content

  • Introduction to IOT
  • IOT Architecture
  • Identify attack surfaces
  • Mobile App security and analysis
  • Specific Web and Mobile based vulnerabilities
  • ARM Architecture and assembly
  • ARM Reversing
  • Device scanning
  • Firmware analysis and reversing
  • Modifying and creating custom firmware
  • Simulating real environments

What to expect

  • Hands-on Labs
  • Reversing binaries and apps
  • Getting familiar with the IoT security
  • This course will give you a direction to start performing pentests on IoT devices

What not to expect

Becoming a hardware/IoT hacker overnight. Use the knowledge gained in the training to start pentesting IoT devices and sharpen your skills

Who Should Take this Course

  • Pentesters/security professional
  • Embedded security enthusiast
  • Anyone interested to learn IoT pentesting

Requirements

  • Basic knowledge of web and mobile security
  • Basic knowledge of Linux OS

Software and hardware requirements

  • Laptop with at least 25 GB free space
  • 2 GB minimum RAM
  • External USB access
  • Administrative privileges on the system
  • Virtualization software – VirtualBox/Vmplayer

Provided at the course

  • IoT devices will be provided during the class for Labs
  • Custom VM
  • Slides

Trainer Biography

File:.png
125px


Mon. 5 - 7 October 2015 (09:00 - 17:00)

Register.jpg

Back to Training Overview