HackLab: Hardware hacking
Smartphones, drones, set-top boxes, smart TVs, IP cameras, IOT devices are all part of our everyday lives. We enjoy, cherish and take them everywhere we go. However are the wonderful functionalities and fun they bring to our lives a good reason to trust them? Remember that they sometime hold the most valuable information we have, can open our garage door, turn on our lights or provide us wireless connection to the Internet.
23 - 25 September 2019
Despite a lot of money spent on software security, hardware security is often neglected. In order to keep up with the technology advancement, (IoT) hardware manufacturers are being pushed to deliver powerful devices at a low cost in the shortest time as possible. This often comes at a security risk. This course will help participants discover how our everyday devices works, how they are secure and how to perform attacks that are not possible in software.
The practical 3 days course provides insight into the most common hardware communication protocols and how to abuse them to gain access to sensitive data on the devices, or make devices behave differently.
With hands on exercises participants will have to identify manufacturers’ backdoors, eavesdrop communication lines, gain access to firmware and modify it to use a device in a way it is not intended to work. You will have to find the credentials of IP cameras or routers and perform a variety of exercises on our custom training board. Participant can bring their own devices if they wish to investigate how secure they are, or if they just forgot the administrator password!
- Security managers
- Security engineers
- IT professionals
- IT auditors with interest in hacking
Participants should have fundamental insight into operating systems. Digital electronics, soldering and embedded systems knowledge is not required but is an advantage.
Date & location
23 - 25 September 2019
The costs for the three day course are € 1.500 ex VAT. Catering (lunch) and course materials included in the price.
- Communication protocols and ports theory
- How to analyse an Integrated Circuit (IC) and look for important components/backdoors
- Communication protocols and ports practical analysis
- Understanding embedded memory types and function
- Soldering, unsoldering and dumping memories
- Common hardware countermeasures used by vendors
- Modifying, reversing firmware
- Capture the flag exercise on hardware
Until four weeks before the start of the course you may cancel your participation in writing free of charge, or you may propose to attend on another date. Should you cancel within four weeks before the start of the course you will have to pay the full course fee. In the event of insufficient participants we reserve the right to cancel the course at any time or move the date of the event. If so, you will be informed in due time.