Offensive Security - CR114 IoT Exploitation
Offensive Security - CR114 IoT Exploitation
Exploitation
CR114
IoT Exploitation
Outline
The Internet of Things maps all physical devices, vehicles, weapons, home appliances and other items,
embedded with electronics, software and sensors that have an IP address and network connectivity. This
highly immersive and advanced training plan will cover the fundamentals of how IoT devices operate and
communicate, and disclose what lies in the background of their physical set-up. Students will explore different
methodologies of detecting vulnerabilities on these devices and learn how to exploit them on the hardware,
software and application layers. Participants will exercise those techniques and will practice further using
physical tools designed to help with the penetration process. The course also prepares attendees to master
radio and Bluetooth exploitation methods, that are critical assets for IoT researchers. By completing the
training, participants will have prominent skills and practical experience in the domain of IoT exploitation, and
will be familiar with some of the most advanced tools and techniques on the market.
Target Audience
The course targets participants with a solid foundation knowledge in computer
networking and information security, who wish to understand the world of IoT security.
Primarily:
ו SoC Analysts & Incident Responders
ו Junior penetration testers
ו System security personnel who are interested in malware analysis
Prerequisites
ו Solid knowledge and experience in infrastructure security and network penetration
testing
ו Familiarity with Linux
ו Basic assembly
ו Familiarity with web-app penetration testing – an advantage
Objectives
On completing this course, delegates will be able to:
ו Understanding IoT architecture and its different components in depth.
ו Learning how to locate vulnerabilities and exploit IoT devices on 3 different layers:
hardware, software and application.
ו Extracting vendor information from examined IoT devices and injecting data into
others.
ו Working with advanced tools to accomplish advanced tasks of IoT vulnerability
discovery and exploitation.
ו Learning to deal with radio and Bluetooth technologies, that are highly popular in
the IoT world, to extract transmitted information, intercept and control the traffic.
Hardware Requirements
The course requires the following hardware kit for each user or pair of users:
ו USB-TTL/FT232/BusPirate/Attify Badge
ו RTL-SDR
ו Arduino
ו A vulnerable device for hardware hacking
ו HackRF/Ubertooth
Content
[email protected] hackerupro.com