Book Online Tickets for IoT Security Training Course, Bengaluru. IoT Introduction

IoT Security Introduction
IoT’s in the current trend
What is IoT
IoT Attack surface

Networking
Communication protocols
Embedded Application Testing
Firmware Analysis
Hardware Architecture



 
Recon on IoT device

Unders

IoT Security Training Course

 

  • Early Bird

    Sale Date Ended

    INR 8000
    Sold Out
  • Regular

    Sale Date Ended

    INR 12000
    Sold Out

Invite friends

Contact Us

Page Views : 115

About The Event

IoT Introduction

  • IoT Security Introduction
  • IoT’s in the current trend
  • What is IoT
  • IoT Attack surface
    • Networking
    • Communication protocols
    • Embedded Application Testing
    • Firmware Analysis
    • Hardware Architecture

 

Recon on IoT device

  • Understanding about the device
    • IoT devices understanding
    • Use of the smart devices
    • Smart technology updates
    • Hands-on
  • Information gathering with help of dorks
    • GHDB dorks
    • IoT Search engines dorks
      • shodan
      • zoomeye
      • Onphye
    • Datasheets of device
    • Hands-On
  • Identifying the attack vectors
    • Writing custom checklist
    • Steps to pentest device
    • Hands-On
  • Scanning the device network level
    • Network concepts
    • Scanning network of device
    • Pentesting it
    • Hands-On
  • Perform the vulnerable assessment on the device
    • Performing scanning
    • Identifying threats
    • Hands-On

 

Communication Protocols

  • Understanding light weight protocols of IoT Devices
    • Wireless communications in IoT
    • Intro to zigbee , zwave , BLE, Lora etc
  • Vulnerability of protocols
    • Discussing security loopholes in protocols
  • Understanding and Exploiting BLE 
    • About BLE
      • Bluetooth History
      • LMP Version
      • Classic vs Smart Ready vs Smart
  • Understanding BLE stack
    • GATT & GAP
    • GAP
    • GATT - Services, Characteristics
  • Analysing BLE Devices
    • Introduction to HCI tools and discover devices
    • Interacting with BLE device - Bluetoothctl
    • Exploring gattool
    • Read / write device using gatttool
    • Analysing the HCI log from host machine
  • Exploiting BLE Devices
    • GATTACKER - Introduction
    • Gattacker - Capture / Modify / Replay Packets
    • Hands-On
  • Understanding about the ZigBee and its vulnerabilities

 

Embedded Application Testing

  • OWASP Embedded Top 10
    • Emulating firmware
    • Pentesting the application
    • Required area of test cases
    • Hands On
  • Automating the application for the bugs
    • By using open source tools to automate the embedded applications
    • Hands On

Firmware analysis

  • Understanding firmware
  • Obtaining firmware
    • Hands-On
  • Analysing firmware
    • Hands-On
  • Reversing engineering firmware
    • Hands-On
  • Automating tools to analyse the firmware
    • Hands-On

 

Hardware architecture and vulnerabilities

  • What and why hardware security matters
  • Requirements of knowledge and tools
  • Explaining Hardware Related Vulnerabilities
  • Identifying the open pins and console access of the device
    • Hands-On
  • Dumping and Reversing the firmware from the hardware
    • Hands-On
  • Playing with STM32
    • Hands-On




 IoTPentest Takeaway Kit

  • Vulnerable firmware device - STM32
  • in-circuit debugger and programmer
  • BLE CTF module device
  • Vulnerable Smart Band
  • UART connector
  • Bluetooth Dongle
  • Attiny85 - custom rubber ducky codes 

 

Training Dump (PDF + Files + Recorded videos)

Note: No Certificate provided but kit will be provided to each participant

 

About the Trainer

Mr. Veerababu Penugonda also known as Mr-IoT
Artcles released in the Hakin9 and Pentest Magazine , conference speaker @poscon @gravitas19 @null @cysinfo
Learner and trainer of IoT penetration testing . Mostly he works on the hardware hacking , Reverese engineering on Firmware

More Events From Same Organizer

Similar Category Events

Venue Map