About The Training
Goa 2025 | Trainings
- AI Security: Terminating The Terminator
- Advanced Infrastructure Security Assessment
- Azure Cloud Attacks for Red and Blue Teams
- Blocking the Storm: A Hands-On Guide to Hardening and Securing Kubernetes Clusters
- DevSecOps - A Hands-on Experience
- Efficient Malware Analysis: Comprehensive Approach
- HackTheWeb: Pentesting Beyond Basics
- IoT Security Bootcamp GOA Edition
- Rapid Threat Model Prototyping (RTMP) - Agile Threat Modeling Mastery including Cloud and AI
- Slaying the RE Dragon: Mastering Reverse Engineering
- The Application Security Tool Stack - How to Discover Vulnerabilities in Software
IoT Security Bootcamp GOA Edition
Start Date: Feb 26, 2025
End Date: Feb 28, 2025
Venue: TBA
The IoT Security Bootcamp is a meticulously designed, hands-on training program aimed at demystifying the complexities of IoT security for professionals and enthusiasts alike. In this course, participants are immersed in a rigorous curriculum that spans a broad spectrum of critical topics, from Linux-based firmware analysis to the nuances of hardware hacking and the intricacies of wireless communication technologies such as Bluetooth Low Energy (BLE).
This training distinguishes itself by offering a deep-dive into the foundations underpinning IoT devices and systems. Participants will delve into the architecture of Linux-based firmware, gaining insights into how these systems operate and how they can be exploited. The course also goes into hardware hacking, covering essential techniques for interfacing devices (UART, JTAG, and SWD), data at rest and in motion (I2C and SPI).
A significant portion of the boot camp is dedicated to wireless technologies, a cornerstone of IoT functionality. Attendees will explore BLE in detail, learning how to capture, analyze, and exploit communications.
This bootcamp follows a learning-by-hacking approach. Each participant receives an IoT Security Hacking Kit, equipped with tools and devices to complete the course, as well as continue working in this area in the long run. This approach ensures that attendees not only understand the theoretical aspects of IoT security but also acquire practical skills in real-world hacking and testing scenarios.
By the end of the boot camp, participants will have achieved a comprehensive understanding of IoT security technologies and testing methodologies. They will be proficient in evaluating IoT architectures, identifying and exploiting vulnerabilities, and employing security testing methodologies across various communication protocols and interfaces.
The boot camp is designed to empower participants to:
+ Analyze and exploit Linux-based firmware in IoT devices.
+ Conduct hardware hacking, interfacing directly with device components to uncover vulnerabilities.
+ Intercept, analyze, and exploit BLE
+ Employ advanced security testing methodologies to assess and improve the security posture of IoT systems.
Basic - Intermediate
Day 1
IoT Security Concepts
- Evaluate the security of different IoT architectures
- Identify the attack surface
- IT and IoT Pentest methodologies and frameworks
- Regulatory update: Cyber Resilience Act (CRA) and ETSI IoT Standards
Bluetooth: classic and BLE
- Concepts
- Sniffing
- MiTM attacks and proxy attacks
Day 2
Firmware
- Definitions
- Dump, extract, and analyze device firmware (Linux-based firmware)
- Emulate parts of an entire firmware
- Adding a backdoor and re-building firmware
Hardware and debugging interfaces
- Electronics 101
- Serial interfaces: UART, SPI, I2C and JTAG
- Extracting firmware and data from EEPROM chips
- JTAG debugging, exploitation
Day 3
Hands-on hacking of a real IoT device, Apply all the information acquired in the 1st days on a real target
- Android Smartphone (running Android 7 or newer) - will used to run standard applications from the PlayStore --- will not be attacked
- USB-A Hub (at some point we connect 3 USB-A devices to the laptop) - powered is better -- optional but encouraged
- Laptop with at least the following requirements
* x86_64-bit processor with 64-bit operating system (Linux is recommended, but Windows and IOS will work as well)
* VT or other 64-bit virtualization settings enabled in your BIOS to run 64-bit VMs
* At least eight (8) GB of RAM, recommended sixteen (16) GB if possible
* At least fifty (50) GB of free hard drive space
* Current virtualization software, both VMware and VirtualBox will work
* Access to an account with administrative permissions and the ability to disable all security software on their laptop such as Antivirus and/or firewalls if needed for the class.
Basic knowledge of Linux or UNIX (especially bash) and security is always an advantage, but not required. It is assumed that attendees will have no knowledge of the topics of the class.
- Penetration testers tasked with auditing IoT Hardware or Analyzing Firmware
- Bug hunters who want to find new bugs in IoT products
- Government officials from defensive or offensive units
- Red team members tasked with compromising the IoT devices
- Embedded security enthusiasts
- IoT Developers and testers
- Anyone interested in IoT security
- Hands-on Labs
- Reverse Engineering
- Getting familiar with the IoT security
- This course will give you a direction to start performing pen tests on IoT product
- Training material/slides
- Practical IoT Hacking Lab Manual PDF
- Commercial IoT device to attack
- IoT Security Hacking Kit (Goa Edition)
* BLE sniffing tools
* BLE dongles
* General purpose USB to GPIO + SPI + I2C + JTAG + UART adaptor
* Breadboard + jumper wires and cables
* EEPROM
* NRF52840 DK
* Jumpers, and USB cables
Becoming an expert overnight. The training provides a good base on which to continue learning
Pablo’s career has taken place mostly doing security in a variety of industries, and roles (from defensive to offensive, and builder). In the last couple of years, he has been working mainly on IoT security, testing dozens of devices, training students on its nuances, and supporting many clients to secure their products. Pablo frequently teaches at top international security conferences such as Black Hat, BruCON, RomeHack, Nullcon, and more.