This is a hands-on IoT hacking class. It covers all aspects of IoT Security, from the technologies and testing methodologies to the vulnerabilities. The main focus is offensive security: attacking and testing the devices and platforms.
We first cover the basics and lay out the ground with concepts before diving into the actual hacking. This provides the understanding of what and why the things can be hacked, with a good mix of knowledge and learning-by-doing or in this case learning-by-hacking.
Students will receive a IoT Hacking Kit (hardware with a value of +350 Euros), which contains the tools and some vulnerable devices used in class, so that they can continue sharpening their skills or hack devices after the event.
After the class, the attendees will be able to evaluate the security of different IoT architectures, identify the attack surface, knowledge of security testing methodologies and how to use them, dump, extract and analyze device firmwares, hack UART, SPI, I2C and JTAGs, debug and attack hardware and software, analyze protocols, attack radio and wireless communications like BLE, Zigbee, and custom protocols and much more.
- IoT Security Concepts
- Evaluate the security of different IoT architectures
- Identify the attack surface
- IT and IoT Pentest methodologies and frameworks
- Bluetooth: classic and BLE
- MiTM attacks and proxy attacks
- Dump, extract and analyze device firmware
- Emulate parts of and entire firmware
- Adding a backdoor and re-building firmware
- Hardware and debugging interfaces
- Electronics 101
- Serial interfaces: UART, SPI, I2C and JTAG
- Extracting firmware and data from EEPROM chips
- JTAG debugging, exploitation
- Software defined radio
- Sniffing and reversing radio frequencies
- Working with 433 MHz: rx, tx, decoding
- Working with Zigbee: rx, tx, decoding
- Hacking Zigbee
Who should take this course?
- All kinds of professionals with an understanding of IT or hacking
- Anyone interested in learning IoT device hacking
- Security Professionals
- IT Professionals
- Embedded Security Enthusiasts
Students will be provided
High level contents :
- Software defined radio (SDR) kit
- BLE sniffing tools
- BLE dongles
- General purpose USB to GPIO + SPI + I2C + JTAG + UART adaptor
- Breadboard + jumper wires and cables
- Zigbee sniffer
- 2 x NRF52840 DK
- Multimeter, Jumpers, and USB cables
- And more..
Note: the content of the kit varies per session based on the content and availability
Basic knowledge of Linux or UNIX (especially bash) and security is always an advantage, but not required. It is assumed that attendees will have no knowledge of the topics of the class.
What students should bring
- Android Smartphone (running Android 7 o newer) – will used to run standard applications from the PlayStore — will not be hacked
- USB-A Hub (at some point we connect 3 USB-A devices to the laptop) – powered is better — optional but encouraged
- Laptop with at least the following requirements
- 64-bit processor with 64-bit operating system (Linux is recommended, but Windows and IOS will work as well)
- VT or other 64-bit virtualization settings enabled in your BIOS to run 64-bit VMs
- At least eight (8) GB of RAM, recommended sixteen (16) GB if possible
- At least fifty (50) GB of free hard drive space
- Current virtualization software, both VmWare and VirtualBox will work
- Access to an account with administrative permissions and the ability to disable all security software on their laptop such as Antivirus and/or firewalls if needed for the class.
Pablo Endres is the founder and CEO of SevenShift,, a IoT boutique security company. He is an experienced Security Consultant, Professional Hacker, Technological Solution Architect and published author. He is a computer engineer, and he holds a handful of security certifications ISC2 CISSP, CompTIA Security+, and ISECOM’s OPSA + OPST.
Pablo’s career has taken place mostly doing security in a variety of industries, like wireless phone, VoIP solution and Cloud Service providers, Banks, contact centers and university labs. Pablo has founded multiple companies in different continents and enjoys hacking, IoT, reverse engineering, teaching, working with new technologies, startups, collaborating with Open Source projects, learning new things, teaching, networking and being challenged. In the last couple of years, he has been working mainly in IoT security, testing dozens of devices and working with multiple platform providers to secure their solutions.