MODULE 1: Hardware Hacking 101
- Review of electronic basics, motivations for hardware hacking, brief history of hacking security talks
- Hardware security vulnerabilities review, offensive & defensive aspects
- Practical cases for hardware hacking analysis
- Hands-on: Basic electronic components use & fingerprinting
MODULE 2: How to access to the hardware for hacking / audit purpose
- Review of methods & tools to perform hardware security audits
- Create your own audit plan, differences with software pentesting
- Hands-on: Practice exercises with hardware auditing tools
- Hands-on: How to acquire electronic signals, tools & demonstration
MODULE 3: How to access the software inside de hardware
- Embedded system architecture presentation (Microcontroller, FPGA), direct access to the software via I/O interfaces (JTAG / SWD, I²C, SPI, UART, RF (ISM Band), etc.)
- Hands-on: Firmware dumping trough different types of interfaces
- Hands-on: Buffer overflow attacks on embedded system
- DEMO: Power analysis attacks - Indirect access to the software or sensitive content via side channel attacks
MODULE 4: Complete hacking lab
- Full hands-on session to apply practical case on our vulnerable embedded system
- Identifying electronic components
- Electronic signals acquisition
- Bus signals interception and analysis
- Modifying and dumping firmware via JTAG debug function (and other I/O access)
- Fuzzing external interface to spot basic vulnerabilities in embedded system
- Exploiting vulnerabilities during an hardware security audit
MODULE 5: How to protect your hardware products
- Secure Design and Development Life Cycle (SDLC)
- Review of hardware security best practices to limit the risks
- Hands-on: Limit JTAG access, limit software vulnerabilities at embedded level
- Review of protections against side channel attack (limit power analysis attacks)
MODULE 6: SDR Hacking
- SDR hacking methodology (Software Defined Radio)
- Tools of trade (GNURadio, hardware products, etc.)
- Hands-on: How to hack a wireless protocol
MODULE 7: Fuzzing hardware devices
- Fuzzing lab methodology
- Hands-on: Create your own fuzzing lab
- Hands-on: Hack a device using a fuzzing attacks
MODULE 8: CTD Capture The Drone
- Attack / Defense practical scenario in team (Capture the Flag Mode)
- Each team have a mini-drone.
- Defend your drone and take down the other by using the tools and methods learned
- The winning team is the one with the higher flying time
We have prepared and updated this training to satisfy both beginners and advanced profiles. No prior electronics knowledge is required
To complete this training, students will need to bring their laptop with:
- Minimum 50 Gb free disk space
- Virtualization solution (e.g VMWARE, Virtualbox)
- Working USB port
We will provide all the software related part and the other tools.
Julien Moinard, an electronics Engineer with a solid background in this field (over 8 years) associated with many personal and professional experiments in the field of microcontrollers. Furthermore, he contributes to the Hardsploit project as a project leader. He is also a senior hardware Pentester in OPALE SECURITY and trainer for Hack In Paris