HackLab: Hardware hacking

Smartphones, drones, set-top boxes, smart TVs, IP cameras, IOT devices are all part of our everyday lives. We enjoy, cherish and take them everywhere we go. However are the wonderful functionalities and fun they bring to our lives a good reason to trust them? Remember that they sometime hold the most valuable information we have, can open our garage door, turn on our lights or provide us wireless connection to the Internet.

23 - 25 September 2019

Despite a lot of money spent on software security, hardware security is often neglected. In order to keep up with the technology advancement, (IoT) hardware manufacturers are being pushed to deliver powerful devices at a low cost in the shortest time as possible. This often comes at a security risk. This course will help participants discover how our everyday devices works, how they are secure and how to perform attacks that are not possible in software. 

Course objective

The practical 3 days course provides insight into the most common hardware communication protocols and how to abuse them to gain access to sensitive data on the devices, or make devices behave differently.

With hands on exercises participants will have to identify manufacturers’ backdoors, eavesdrop communication lines, gain access to firmware and modify it to use a device in a way it is not intended to work. You will have to find the credentials of IP cameras or routers and perform a variety of exercises on our custom training board. Participant can bring their own devices if they wish to investigate how secure they are, or if they just forgot the administrator password!


Target Audience

  • Security managers
  • Security engineers
  • IT professionals
  • IT auditors with interest in hacking

Participants should have fundamental insight into operating systems. Digital electronics, soldering and embedded systems knowledge is not required but is an advantage.

Date & location    

23 - 25 September 2019


The costs for the three day course are € 1.500 ex VAT. Catering (lunch) and course materials included in the price.


Day 1

  • Introduction
  • Communication protocols and ports theory
  • How to analyse an Integrated Circuit (IC) and look for important components/backdoors
  • Communication protocols and ports practical analysis

Day 2

  • Understanding embedded memory types and function
  • Soldering, unsoldering and dumping memories
  • Common hardware countermeasures used by vendors

Day 3

  • Modifying, reversing firmware
  • Capture the flag exercise on hardware
  • Recap

Permanent Education

Deloitte Academy is accredited by the NBA PE institution and has the NRTO label. This course qualifies for 18 PE hours. You can also register your PE-hours at the NOB or VRC.

For more information about our accreditation, we refer you to our Permanent Education page.


Until four weeks before the start of the course you may cancel your participation in writing free of charge, or you may propose to attend on another date. Should you cancel within four weeks before the start of the course you will have to pay the full course fee. In the event of insufficient participants we reserve the right to cancel the course at any time or move the date of the event. If so, you will be informed in due time.


Jilles Groenendijk

Jilles Groenendijk

Junior Manager

Jilles has been involved as an Ethical Hardware Hacker in a variety of projects for multiple industries. His field of expertise is based around hardware security testing and continues improvement of m... Meer

James Gratchoff

James Gratchoff


James has been involved as an Ethical Hacker in a great variety of projects for multiple industries. His field of expertise is based around web application testing and hardware security testing. From ... Meer