IoT Exploitation Training

7 – 8 Mar, 2018Tokyo, JapanPrivate: Recruit Holdings Co., Ltd.
19 – 20 Jul, 2017SingaporeNSHC initiative

In the recent boom of IoT industry, IoT devices are now all around us. Despite the severe need, IoT developers have minimal considerations in developing higher security standard. IoT device consuming institutions and corporations do not realize their high level of security can easily be compromised through a loophole existing in IoT devices.

For example, a hacker can hack into Network Attached Storage(NAS) to steal all the information from a company. One can also connect to internet connected printer to penetrate into an institution’s intranet. Students will be able to find vulnerabilities in various IoT devices and exploit them.

Why Advanced IoT Exploitation Training?

Due to increasing
IoT threat

Analyze IoT firmware
through QEMU

Search vulnerabilities and
exploit IoT devices

Understand hackers’ point of
view in IoT environment

Learn how to repackage
a firmware

Develop creative
offensive skillset

What IoT Devices can our Training cover?

Wi-Fi Router

NAS

NVR / DVR

Connected Car

Drone

Printer

Smart POS

Smart Living

Unique Strengths

Hands On

We dive deeper than theory based
knowledge to teach practical
skills in IoT area

Customized Training

Our training can be fully customized
to cater for various needs in
companies & institutions

300+ Zero Days

NSHC owns more than 300 zero
days in IoT devices which are
utilized for this training

Who should take this training?

Security Researcher

IoT Developer

System / Network
Administrator

Anyone

Standard Curriculum

Register for upcoming training

  • Hardware / Software Requirements
    • Laptop with at least 40 GB free space
    • 4+ GB minimum RAM (2+ GB for the VM)
    • External USB access
    • Administrative privileges on the system
    • Virtualization software – VMWare
    • Disassembler which supports x86/64, ARM and MIPS (IDA Pro is preferred) *IDA free doesn’t support ARM or MIPS
    • Hex editor
 
  • Prerequisite Knowledge:
    • Basic knowledge of Linux OS
    • Basic knowledge of computer security
    • Basic knowledge of exploiting
    • Basic knowledge of programming C, python, x86 assembly would be a plus