About The Training
Berlin 2025 | Trainings
- A Hands‑On Guide to Hardening Kubernetes & Cloud‑Native Infrastructure
- AI Security: Terminating The Terminator
- AdversaryOps: Engineering Red Team Tradecraft
- Application Security Tool Stack - How to Discover Vulnerabilities in Software
- Building Secure Firmware: Best Practices and Labs
- Cloud Red Team Tactics for Attacking and Defending Azure
- Cyber Threat Intelligence Bootcamp: Hands-on Labs & Real-World Scenarios
- Digital Deception: Advanced initial Access Mastery
- Hacking Android Applications
- Hacking Modern Web & Desktop apps: Master the Future of Attack Vectors
- IoT Security Bootcamp GOA Edition
- Slaying the RE Dragon: Mastering Reverse Engineering
< Training Title />
IoT Security Bootcamp GOA Edition
< Training Schedule />
Start Date: Mar 02, 2026
End Date: Mar 04, 2026
< Training Objectives />
The IoT Security Bootcamp is a meticulously designed, hands-on training program that aims to demystify the complexities of IoT security for both professionals and enthusiasts. In this course, participants are immersed in a rigorous curriculum that spans a broad spectrum of critical topics, from Linux-based firmware analysis to the nuances of hardware hacking and the intricacies of wireless communication technologies such as Bluetooth Low Energy (BLE).
This training distinguishes itself by offering a comprehensive examination of the foundational principles underlying IoT devices and systems. Participants will delve into the architecture of Linux-based firmware, gaining insights into how these systems operate and how they can be exploited. We will also use the latest tools, platforms (including AI), to complement the manual analysis and discover their weaknesses and strengths. Hardware hacking is an important topic, including essential techniques for interfacing devices (UART, JTAG, and SWD), data at rest and in motion (I2C and SPI).
A significant portion of the boot camp is dedicated to wireless technologies, a cornerstone of IoT functionality. Attendees will explore BLE in detail, learning how to capture, analyze, and exploit communications.
This bootcamp follows a learning-by-hacking approach. By the end of the boot camp, participants will have achieved a comprehensive understanding of IoT security technologies and testing methodologies. They will be proficient in evaluating IoT architectures, identifying and exploiting vulnerabilities, and employing security testing methodologies across various communication protocols and interfaces.
The boot camp is designed to empower participants to:
- Analyze and exploit Linux-based firmware in IoT devices.
- Conduct hardware hacking, interfacing directly with device components to uncover vulnerabilities.
- Intercept, analyze, and exploit BLE
- Employ advanced security testing methodologies to assess and improve the security posture of IoT systems.
< Training Level />
Basic;Intermediate
< Training Outlines />
Day 1
IoT Security Concepts
Evaluate the security of different IoT architectures
Identify the attack surface
IT and IoT Pentest methodologies and frameworks
Regulatory update: Cyber Resilience Act (CRA) and ETSI IoT Standards
Bluetooth: classic and BLE
Concepts
Sniffing
MiTM attacks and proxy attacks
Day 2
Firmware
Definitions
Dump, extract, and analyze device firmware (Linux-based firmware)
Using state of the art tools, platforms and AI to complement the manual investigation
Emulate parts of an entire firmware
Adding a backdoor and rebuilding firmware
Hardware and debugging interfaces
Electronics 101
Serial interfaces: UART, SPI, I2C and JTAG
Extracting firmware and data from EEPROM chips
JTAG debugging, exploitation
Day 3
Hands-on hacking of a real IoT device, Apply all the TTPs (Techniques and Procedures) on a real target
< WHAT TO BRING? />
- Android Smartphone (running Android 7 or newer) - will used to run standard applications from the PlayStore --- will not be attacked
- USB-A Hub (at some point we connect 3 USB-A devices to the laptop) - powered is better -- optional but encouraged
- Laptop with at least the following requirements
- x86_64-bit processor with 64-bit operating system (Linux is recommended, but Windows and IOS will work as well)
- VT or other 64-bit virtualization settings enabled in your BIOS to run 64-bit VMs
- At least eight (8) GB of RAM, recommended sixteen (16) GB if possible
- At least fifty (50) GB of free hard drive space
- Current virtualization software, both VMware and VirtualBox, will work
- Access to an account with administrative permissions and the ability to disable all security software on their laptop, such as Antivirus and/or firewall,s if needed for the class.
< Training PREREQUISITE />
Basic knowledge of Linux or UNIX (especially bash) and security is always an advantage, but not required. It is assumed that attendees will have no prior knowledge of the topics of the class.
< WHO SHOULD ATTEND? />
- Penetration testers tasked with auditing IoT Hardware or Analyzing Firmware
- Bug hunters who want to find new bugs in IoT products
- Government officials from defensive or offensive units
- Red team members tasked with compromising the IoT devices
- Embedded security enthusiasts
- IoT Developers and testers
- Anyone interested in IoT security
< WHAT TO EXPECT? />
Hands-on Labs
- Reverse Engineering
- Getting familiar with the IoT security
- This course will give you a direction to start performing pen tests on IoT product
< WHAT ATTENDEES WILL GET? />
- Training material/slides
- Practical IoT Hacking Lab Manual PDF
- IoT device to attack
< WHAT NOT TO EXPECT? />
Becoming an expert overnight. The training provides a good base on which to continue learning
< About the Trainer />
Pablo’s career has taken place mostly doing security in a variety of industries, and roles (from defensive to offensive, and builder). In the last couple of years, he has been working mainly on IoT security, testing dozens of devices, training students on its nuances, and supporting many clients to secure their products. Pablo frequently teaches at top international security conferences such as Black Hat, BruCON, RomeHack, Nullcon, and more.
