Brucon Wrap-Up : Internet of Things Security Training

As you might already know, Attify has come up with a brand new and unique course – targeted around Internet of Things Security .

Our new training class “Offensive IoT Exploitation” is receiving some really well feedback from the attendees. Coming up with a new training course is really tough – it takes months/years of research put in to create a specific module. And that is what makes it amazing.

Brucon – one of the conferences where Attify team was for the 2nd consecutive year delivering a training – this time on IoT Exploitation (previous year it was Advanced Android and iOS Hands-on Exploitation).

We added a couple new modules to the course this time targeted around Exploitation specifically, and bypassing various protections on the device. And as always, the attendees got to hack some nice smart devices using advanced manual techniques and automated approaches.

Also, Brucon was kind enough to provide us with an amazing training location. Picture below.

Internet of Things Security and Exploitation

At the end, thanks everyone for coming. Glad you enjoyed the course.


comments powered by Disqus
Android android application security android hands on security and exploitation training android security Apktool application auditing application security auditing appsec usa appwatch attify attify badge attify training binwalk blackberry pentesting blackhat ble BLE hacking and exploitation BLE sniffing box brut Exception chroot cloud based mobile application security scanner consulting CTF Damn Vulnerable iOS App devops dumping memory embedded hacking exploitation exploiting smart devices Firmware hacking frida hackfest hacking smart devices how to secure iot device IDA internet of things Internet of Things Security ios application security ios security iot iot device IoT Exploitation iot hacking iot pentest iot pentesting iot security iot security training iotsecurity jtag jtag debugging mobile app mobile application security mobile application security testing mobile security ninja recon technique offensive iot exploitation ola cabs owasp owasp appsec penetration testing pentesting pentesting mobile apps powerofcommunity PrinterSecurity qemu quizup radio communication protocol radio coomunication Reversing sdr secure coding guidelines security security issue security services security training security vulnerability smart devices social networking spi threat modeling training uart vulnerability writeups xposed hooking zigbee zigbee exploitation zigbee security zwave firmware reverse engineering firmware emulation firmware analysis toolkit firmadyne getting started with firmware hacking iot penetration testing