"The great power of the Internet of Things comes with the great responsibility of security". Being the hottest technology, the developments and innovations are happening at a stellar speed, but the security of IoT is yet to catch up. Since the safety and security repercussions are serious and at times life-threatening, there is no way you can afford to neglect the security of IoT products.
"Practical Internet of Things (IoT) Hacking” is a unique course that offers security professionals, a comprehensive understanding of the complete IoT Technology suite including, IoT protocols, firmware, client-side, etc., and their underlying weaknesses. The extensive hands-on labs enable attendees to identify, exploit, or fix vulnerabilities in IoT, not just on emulators but also on real smart devices.
The course focuses on the attack surface on current and evolving IoT technologies in various domains such as home, enterprise Automation, etc. It covers grounds-up on various IoT protocols including internals, specific attack scenarios for individual protocols, and open-source software/hardware tools one needs to have in their IoT penetration testing arsenal. It also covers hardware attack vectors and approaches to identify respective vulnerabilities.
Throughout the course, we will Raspberry pi which was created by us specifically for IoT penetration testing. We will also distribute DIVA – IoT, a vulnerable IoT sensor made in-house for hands-on exercises.
The “Practical Internet of Things (IoT) Hacking” course is aimed at security professionals who want to enhance their skills and move to/specialize in IoT security. Godspeed!
Training level: Basic; Intermediate
Becoming a hardware/IoT hacker overnight. Use the knowledge gained in the training to start pentesting IoT devices and sharpen your skills.
Payatu is a Research-powered Cybersecurity service and training organization with expertise in IoT/Embedded, ICS/OT, Automotive, Mobile, Web, Cloud, and Infra security. Payatu trainers are well known for research in their respective domains and the ability to impart the same knowledge to the attendees by using an effective combination of visuals, demos, and hands-on.
Hariprasad K V is currently working at Payatu as an IoT Security Researcher. He specializes in Firmware analysis and reverse engineering and is interested in understanding the internal workings of devices. He has experience working on various IoT devices varying from simple bare-metal systems to complex OS-based systems. He spends most of his day staring into the matrix and writing scripts to do trivial tasks.
Kartheek Lade is an IoT Security Researcher at Payatu who works in the Hardware & Automotive Security verticals of IoT, as he is constantly learning about wireless security & ISO/SAE 21434. Kartheek loves contributing and being a part of security communities and helping people get started in Cyber Security. He has been a speaker at BlackHat Asia, OWASP Seasides, C0c0n, BSides Delhi, etc, He also created blogs and an open-source tool CANalyse, which helps like-minded people to learn more about cyber security. CANalyse: https://github.com/canalyse/CANalyse
Shakir Zari is currently working as Lead IoT Security Consultant at Payatu. He has 4+ years of hands-on experience in breaking and reversing the hardware of different IoT devices like consumer & medical devices. He also has 4+ years of experience in designing hardware & developing IoT products. Through his findings, he has filed 10+ CVEs under his research work.
Appar Thusoo is currently working at Payatu as a Sr. IoT Security Researcher. His background and interests are in hardware and firmware security & reverse engineering, open-source software development, DSP and signal to a process, and software-defined radio (SDR). Appar is an active speaker and trainer on various international platforms & a founding member of SI-SDR-UG: Community for comms.