This is a hands-on IoT hacking class. It covers all aspects of IoT Security, from the technologies and testing methodologies to the vulnerabilities. The main focus is offensive security: attacking and testing the devices and platforms. We first cover the basics and lay out the ground with concepts before diving into the actual hacking. This provides the understanding of what and why the things can be hacked, with a good mix of knowledge and learning-by-doing or in this case learning-by-hacking.
Students will receive a IoT Hacking Kit (hardware with a value of +300 Euros), which contains the tools and some vulnerable devices used in class, so that they can continue sharpening their skills or hack devices after the event.
After the class, the attendees will be able to evaluate the security of different IoT architectures, identify the attack surface, knowledge of security testing methodologies and how to use them, dump, extract and analyze device firmwares, hack UART, SPI, I2C and JTAGs, debug and attack hardware and software, analyze protocols, attack radio and wireless communications like BLE, Zigbee, and custom protocols and much more.
- IoT Security Concepts
- Evaluate the security of different IoT architectures
- Identify the attack surface
- IT and IoT Pentest methodologies and frameworks
- Bluetooth: classic and BLE
- MiTM attacks and proxy attacks
- Dump, extract and analyze device firmware
- Emulate parts of and entire firmware
- Adding a backdoor and re-building firmware
- Hardware and debugging interfaces
- Electronics 101
- Serial interfaces: UART, SPI, I2C and JTAG
- Extracting firmware and data from EEPROM chips
- JTAG debugging, exploitation
- Software defined radio
- Sniffing and reversing radio frequencies
- Working with 433 MHz: rx, tx, decoding
- Working with Zigbee: rx, tx, decoding
- Hacking Zigbee
- Capture the Flag
- Hack a real IoT device
Who should take this course?
- Security Professionals
- IT Professionals
- Embedded Security Enthusiasts
- All kinds of professionals with an understanding of IT or hacking
- Anyone interested in learning IoT device hacking
Students will be provided
High level contents :
- FT232H – USB to serial adaptor (GPIO, UART, JTAG, I2C, SPI)
- Smart Camera
- Board to perform JTAG exploitation
- Arduino for UART, JTAG enumeration etc..
- Xbee and Zigbee sniffer for ZigBee communication
- BLE and BLE sniffing dongles
- Smart Bulb and Smart Plug
- Multimeter, Jumpers, Screw driver kits, mini and micro cables
Note: the content of the kit varies per session based on the content and availability
Basic knowledge of Linux or UNIX (especially bash) and security is always an advantage, but not required. It is assumed that attendees will have no knowledge of the topics of the class.
What students should bring
- Each attendee must bring a laptop that meets the following requirements:
- 64-bit processor with 64-bit operating system
- VT or other 64-bit virtualization settings enabled in your BIOS to run 64-bit VMs
- At least eight (8) GB of RAM, recommended sixteen (16) GB if possible
- At least fifty (50) GB of free hard drive space
- VMware Player 12 (or later), VMware Workstation 12 (or later), or VMware Fusion 8 (or later) installed BEFORE class begins. Other virtualization software such as Parallels, VirtualBox, or earlier versions of VMware products may work if the attendee is familiar with its functionality and takes full ownership of its configuration, however non-VMware software is not officially supported and VMware should be pre-installed as a backup just in case.
- Access to an account with administrative permissions and the ability to disable all security software on their laptop such as Antivirus and/or firewalls if needed for the
Pablo Endres is the founder and CEO of SevenShift GmbH, an IoT boutique security company. He is an experienced Security Consultant, Professional Hacker, Technological Solution Architect and published author. He is a computer engineer, and he holds a handful of security certifications ISC2 CISSP, CompTIA Security+, and ISECOM’s OPSA + OPST.
Pablo’s career has taken place mostly doing security in a variety of industries, like wireless phone, VoIP solution and Cloud Service providers, Banks, contact centers and university labs.
Pablo has founded multiple companies in different continents and enjoys hacking, IoT, reverse engineering, teaching, working with new technologies, startups, collaborating with Open Source projects, learning new things, teaching, networking and being challenged. In the last couple of years, he has been working mainly in IoT security, testing dozens of devices and working with multiple platform providers to secure their solutions.