Security Training▸ loT

IoT Exploitation Training

Finding Zero-Day of IoT Devices

#IoT Firmware

#Zero-Day

#Static/Dynamic Analysis

#Exploit Hands-on Exercise

What is IoT Exploitation Training?

Our life has become much simpler and more convenient as the internet has been adapted to daily devices we use. However, the more convenient our life becomes, the more prone IoT devices are to be attacked. In this course, you can find various types of attacks and vulnerabilities of IoT devices such as CCTV, Drone, Wi-Fi Router and Data Storage, and the methodology hackers take. Find out how hackers attack IoT devices by analyzing vulnerabilities of IoT devices we use everyday!

Who should take this course?

IoT Security Consultant

IoT Security Consultant

IoT Security Researcher

IoT Security Researcher

IoT Programmer

IoT Programmer

Cyber Security Manager

Cyber Security Manager

IoT Facility Manager

IoT Facility Manager

Other IoT-Related Officials

Other IoT-Related Officials

Why IoT Exploitation Training?

Increasing number of IoT
devices and use cases of IoT

 

Increasing number of
attacks on IoT devices

 

To secure industrial equipment
that uses IoT systems

To Find Vulnerabilities and
intrusion of IoT devices

To minimize the potential
damage from cyber attacks

Due to other related cyber
threats of IoT devices

Curriculum

Day 1

[Intro. to IoT Exploitation]

1. Understanding IoT Vulnerability
– Understanding the significance of the IoT security
– Understanding the attacker’s intention behind IoT vulnerability

2. IoT Bug Case Study
– Major types of IoT Bugs
– Different kinds of IoT Bugs

01

[Analyze Firmware] – Part 1

1. Firmware Structure
– Firmware Extraction Methodology
– Devices for extracting firmware

2. Analyzing Firmware
– Understanding the firmware architecture
– Devices For analyzing firmware

02

1. Analyzing Firmware

Lab

[Analyze Firmware] – Part 2

1. Hardware Reballing
– The difference between former and current embedded systems
– Why do we do Reballing?

2. BGA type of EMMC Reballing
– Reballing Methodology

03

[Analyze Firmware] – Part 3

1. QEMU and Firmadyne
– Overview of QEMU and its operation mode
– Overview of Firmadyne

2. UART, JTAG, QEMU

04

1. Finding 1-day Vulnerability

Lab

[Analyze Firmware] – Part 4

1. Firmware Repackaging
– Methodology of Repackaging

05
Day 2

[Static Analysis]

1. ARM Assembly Vulnerable Functions
– Reverse Engineering

2. MIPS Assembly Vulnerable Functions

01

1. Static Analysis

Lab

[Exploitation Basic]

1. Different types of tools used in Exploitation
– hecksec, Pwntools, Libc database

2. Command Injection
– ARM / MIPS Assembly and Exploitation

02

[Dynamic Analysis] - Part 1

1. Remote Debugging
– Methodology for remote debugging
– Hands-on exercise

2. Fuzzing
– Understanding Fuzzing
– Tools used for Fuzzing

03

[Dynamic Analysis] - Part 2

1. Symbolic Execution
– Symbolic Execution
– DBI
-Taint Analysis

04
Day 3

Memory Corruption Vulnerability

1. Memory Corruption Vulnerabiity
– Understanding Buffer Overflow
– Various Ways of Memory Management
– Buffer Overflow (Stack based)
– Buffer Overflow (Heap based)

01

[Mini CTF]

Topics: Firmware, ARM, MIPS, Hardware, Fuzzing, Virtualization

02

1. Router

2. NAS

3. D-Link CCTV

4. Other IoT Devices

Lab

Tools

Hardware
Cisco Router, Netgear Router, ASUS Router, D-Link Router, QNAP NAS, D-Link CCTV, Raspberry Pi Zero

Software
VMWare Workstation, Various open source tools for Exploitation

Prerequisites

Basic knowledge on cyber security

Linux OS & Kali Linux

Basic knowledge on exploiting

C, Python Basics

x86 assembly

Instructors

Head of RedAlert Lab
Ocean Moon

Head of RedAlert Lab

문해은

Ocean Moon | Head of RedAlert Lab

Main Training Area

ICS/SCADA Advanced

Chief Researcher
SunHo Lee

Chief Researcher

이선호

SunHo Lee | Chief Researcher

Researcher
JunYong Park

Researcher

박준용

JunYong Park | Researcher

Main Training Area

ISA/IEC 62443 Standard

Researcher
DongHyun Kim

Researcher

김동현

DongHyun Kim | Researcher

Head of RedAlert Lab
Ocean Moon

Head of RedAlert Lab

문해은

Ocean Moon | Head of RedAlert Lab

Main Training Area

ICS/SCADA Advanced

Chief
SunHo Lee

Chief

이선호

SunHo Lee | Chief Researcher

Researcher
JunYong Park

Researcher

박준용

JunYong Park | Researcher

Main Training Area

ISA/IEC 62443 Standard

Researcher
DongHyun Kim

Researcher

김동현

DongHyun Kim | Researcher

Training Kit

NAS (QNAP)

Can find vulnerabilities of ARM based systems and exploit by bypassing the memory protection mechanism

Wi-Fi Router (ASUS, D-Link, Cisco, Netgear)

Can extract firmware of the MIPS based system and exploit

Raspberry Pi Zero

Can Build OpenWRT and analyze firmware

CCTV

Can analyze authorizing mechanism of ARM based device and find vulnerabilities to exploit

Reviews

Videos(Pictures)

Notice

NSHC provides following items for your convenience.

1) Laptop
We provide laptop with software that you will need for hands-on training.

2) Textbook
All the learning materials will be provided in form of a textbook.

3) Training fee
Lunches and snacks are included in your training fee.
Transportation, accommodation, and dinner are excluded.

4) Certificate of Completion
We give the certificate of completion to those who finish the training.

Location

TBA, Seoul

Registration and Payment

There are two ways to pay the training fee: PayPal or bank transfer

You may select preferred payment method when submitting the registration form.
We will assist you after your registration form is received.

If you have any question regarding the payment, please contact us at training@nshc.net.

Refund Policy

You may receive a full refund without a penalty if you make cancellation a week prior to the training. Or, you will be charged for 10% cancellation fee.

  • Cancellation made until [8 days] before the training : fully refundable

  • Cancellation made within [7 days ~ the day of training]: 10% cancellation fee is charged.

  • Refund policy may be changed without a notice.

Security Training▸ loT

IoT Exploitation Training

#IoT Firmware

#ZeroDay

#Static/Dynamic Analysis

#Exploit Hands-on Exercise

$3,300(USD)

VAT incl.
  • Date
    Coming soon 🙂
  • Time
    09:30 ~ 18:00
  • Location
    TBA, Seoul
  • Deadline
    -
  • Capacity
    15
Register

IoT Exploitation 전문가 교육 수강신청

(1=입문자, 5=전문가)

수강신청

loT Exploitation 전문가 교육 수강신청

(1=입문자, 5=전문가)