What to bring:
Students are required to bring their own laptop running Windows® XP/2000 with a web browser installed and containing functional Ethernet, USB, and Serial ports (DB-9). The laptop will be used for web-based research and to control the test equipment used in the course (software and drivers will be installed but can be removed at the end of the course).
No loaner laptops will be available. Students who do not bring a laptop or who have laptops running other operating systems may work with a willing partner for the hands-on exercises that require Windows.
|
Overview:
Hardware hacking. Mods. Tweaks. Though the terminology is new, the concepts are not: A gearhead in the 1950s adding a custom paint job and turbo-charged engine to his Chevy Fleetline, a ’70s teen converting his ordinary bedroom into a “disco palace of love,” complete with strobe lights and a high-fidelity eight-track system, or a technogeek today bypassing the cryptographic authentication routines of the Microsoft® Xbox® to allow him to play homebrew games written by hobbyists. Building on an existing idea to create something better. Making products do things they were never intended to do. Reverse engineering products to defeat protection and security mechanisms. These types of self-expression can be found throughout recorded history.
This course is the first of its kind. We focus entirely on hardware hacking. It's hands-on. Not only do we, as hackers, explore reverse engineering and hardware hacking techniques, we also look at defense mechanisms and technologies that we, as designers, can use to protect our products from attackers. We'll guide you through an introduction to reverse engineering, explore the basic electronics fundamentals and common test equipment, and then dive into the step-by-step processes of successful circuit modifications and hardware hacking.
A more detailed course outline may be found at the Grand Idea Studio website.
Learning Objectives:
- Familiarity with basic electronic components and theories
- General use of test measurement equipment
- Understand the mindset of a hardware hacker and why he does what he does
- Gain a knowledge of how to successfully reverse engineer products
- Learn about embedded security, ways to design hardware securely, and ways to defeat those mechanisms
- Become confident that you can open a piece of hardware without breaking it (and maybe how to fix it if you do)
By the time the student finishes the class, he will have the confidence and experience to modify and tinker with hardware, reverse engineer technologies, and evaluate the security of his own products. The student will also be familiar with the mindset of a hardware hacker, basic electronics concepts, and how to use common test measurement tools.
Although the course is more focused on hardware hacking techniques and the reverse engineering of existing products, it will also examine many of the topics from a designer's point of view to enable him to properly incorporate security into his own hardware products and protect them from attackers.
What to Expect:
The class is a crash course in electronics, hardware hacking, and reverse engineering which spans two days. The first day introduces the students to the basics of electronics, common hardware hacking tools, and fundamentals of reverse engineering. The second day continues with more hardware hacking experiments and advanced techniques, and is concluded with a full-scale, hands-on hardware hacking challenge performed in small groups.
Students should expect to get their hands dirty with some basic electronics construction and reverse engineering exercises. The student should come into the class with an open mind and a sense of humor. Expect to leave the course with a smile on your face and a hacked circuit board around your neck.
Each student will be presented with the following materials and resources to be used and referenced throughout the course:
- Electronics measurement tools, including a multimeter, oscilloscope, soldering iron, and device programmer
- Safety equipment
- All other necessary tools, components, and circuit boards
Following successful completion of the course, each student will leave with:
- Grand Idea Studio's custom hardware hacking training circuit board
- CD-ROM containing the course lecture slides and copious research papers, notes, and references
Who Should Attend:
The target audience for this course is computer security consultants, design engineers, technical management, senior management, and any other individuals who are looking for a hands-on experience of hardware hacking and reverse engineering.
The course aims to educate everyone, from the beginner hobbyist or curious computer security professional with no electronics experience, to the self-proclaimed "gadget geek." Whether you like to get your hands dirty with hacking hardware or you just are curious about how hackers will reverse engineer your products, this course will be of benefit.
No electronics, hardware hacking, or computer security experience is necessary, but a passing familiarity of basic concepts may make the class easier to swallow.
What to Bring:
Students are required to bring their own laptop running Windows XP/2000 with a web browser installed and containing functional Ethernet, USB, and Serial ports (DB-9). The laptop will be used for web-based research and to control the test equipment used in the course (software and drivers will be installed but can be removed at the end of the course).
No loaner laptops will be available. Students who do not bring a laptop or who have laptops running other operating systems may work with a willing partner for the hands-on exercises that require Windows.
|
Trainer:
|
Joe Grand is the President and Principal Electrical Engineer of Grand Idea Studio, a San Diego-based product development and intellectual property licensing firm, where he specializes in the invention and design of consumer electronics, toys, video games, and medical devices.
Joe has testified before the United States Senate Governmental Affairs Committee and is a former member of the legendary hacker collective L0pht Heavy Industries. He is the author of many security-related software tools, including pdd, the first forensic acquisition application for Palm devices. Joe currently has a patent pending on a hardware-based computer memory imaging concept and apparatus (U.S. Patent Serial No. 10/325,506) and another pending on a unique apparatus, method, and systems for viewing a virtual environment.
Joe is a prominent speaker and has presented his work at numerous academic, industry, and private forums, including the United States Air Force Office of Special Investigations, the Naval Postgraduate School, the IBM Thomas J. Watson Research Center, the Embedded Systems Conference, the Black Hat Briefings, and DEFCON. He has appeared in documentaries and news for television, airplane in-flight programming, and print media outlets.
Joe is the author of "Game Console Hacking and Hardware Hacking: Have Fun While Voiding Your Warranty", a co-author of "Stealing The Network: How to Own A Continent", and is a frequent contributor to other texts. Joe holds a Bachelor of Science degree in Computer Engineering from Boston University.
|