Internet of Things Security Training

With the rise of smart devices, IoT Security is the major concern for the users. Every day these new devices are being compromised and sensitive users data is being breached.

We – Attify team has been constantly working in the field of Securing these IoT Devices and also creating awareness to IoT Device Developers Group.

We are conducting a training in Offensive IoT Exploitation in Black Hat(Las Vegas) – 1-2 and 3-4 August’15  to encourage awareness of IoT security in the community and to get the attendees familiar with the vulnerabilities and exploitation techniques in the Internet of Things devices.

(Update : The current training class is already sold out https://www.blackhat.com/us-15/training/offensive-internet-of-things-iot-exploitation.html. You can contact us for private class here or register for the upcoming class at BlackHat Amsterdam in Nov’15)

Some of the things that we cover in our trainings are :

  • Extract and ananlyze device firmwares
  • Analysis using IDA pro
  • Get familiar with UART, SPI and JTAGs
  • Hardware and Software Debugging
  • Identify attack surfaces and write fuzzers
  • Specific Web and Mobile based vulnerabilities
  • Familiarity with NFC, Bluetooth, RFID
  • Write exploits for the platforms
  • Bypass security mitigations

**
**It’s a 2 day class full of hands-on exercises and challenges, which guides the attendees through the in depth of security and exploitation in the Internet of Things devices. The class is also useful for penetration testers who would like to use their previous pentesting experience in IoT Hacking.



comments powered by Disqus
Tags
Android android application security android hands on security and exploitation training android security Apktool application auditing application security auditing appsec usa appwatch attify attify badge attify training binwalk blackberry pentesting blackhat ble BLE hacking and exploitation BLE sniffing box brut Exception chroot cloud based mobile application security scanner consulting CTF Damn Vulnerable iOS App devops dumping memory embedded hacking exploitation exploiting smart devices Firmware hacking frida hackfest hacking smart devices how to secure iot device IDA internet of things Internet of Things Security ios application security ios security iot iot device IoT Exploitation iot hacking iot pentest iot pentesting iot security iot security training iotsecurity jtag jtag debugging mobile app mobile application security mobile application security testing mobile security ninja recon technique offensive iot exploitation ola cabs owasp owasp appsec penetration testing pentesting pentesting mobile apps powerofcommunity PrinterSecurity qemu quizup radio communication protocol radio coomunication Reversing sdr secure coding guidelines security security issue security services security training security vulnerability smart devices social networking spi threat modeling training uart vulnerability writeups xposed hooking zigbee zigbee exploitation zigbee security zwave firmware reverse engineering firmware emulation firmware analysis toolkit firmadyne getting started with firmware hacking iot penetration testing iot attacks recent iot attacks cyber attacks iot hacks biggest iot attacks of all time hacked smart devices iot bots, malwares latest iot attacks BtleJuice bleah

Instagram