Détails de la formation
Overview
« The great power of Internet Of Things comes with the great responsibility of security ». Being the hottest technology, the developments and innovations are happening at a stellar speed, but the security of IoT is yet to catch up. Since the safety and security repercussions are serious and at times life threatening, there is no way you can afford to neglect the security of IoT products.
« Practical Internet of Things (IoT) Hacking” is a unique course which offers security professionals, a comprehensive understanding of the complete IoT Technology suite including, IoT protocols, sensors, client side, mobile, cloud and their underlying weaknesses. The extensive hands-on labs enable attendees to identify, exploitL’exploit est un programme ou une technique démontrant l’existence d’une vulnérabilité au sein d’un logiciel informatique. Celui-ci peut se limiter à une démonstration de faisabilité d'exploitation de cette faille (preuve par l’exemple) ou être utilisé pour mener une action malveillante. or fix vulnerabilities in IoT, not just on emulators but on real smart devices as well.
The course focuses on the attack surface on current and evolving IoT technologies in various domains such as home, enterprise Automation. It covers grounds-up on various IoT protocols including internals, specific attack scenarios for individual protocols and open source software/hardware tools one needs to have in their IoT penetration testing arsenal. It also covers hardware attack vectors and approaches to identify respective vulnerabilities . In addition to the protocols and hardware it also focuses on reverse engineering mobile apps and native code to find weaknesses.
Throughout the course, We will use eXos, an VM created by us specifically for IoT penetration testing. eXos is the result of our R&D and has most of the required tools for IoT security analysis. We will also distribute DIVA – IoT, a vulnerable IoT sensor made in-house for hands-on exercises.
The “Practical Internet of Things (IoT) Hacking” course is aimed at security professionals who want to enhance their skills and move to/specialise in IoT security. The course is structured for beginner to intermediate level attendees who do not have any experience in IoT, reversing or hardware.
Course outline
* Introduction to IOT
* IOT Architecture
* IoT attack surface
* Expliot – IoT exploitation framework
– Intorduction
– Architecture
– Test Cases
* IoT Protocols Overview
* MQTT
– Introduction
– Protocol Internals
– Reconnaisance
– Information leakage
– DOS attacks
– Hands-on with open source tools
* CoAP
– Introduction
– Protocol Internals
– Reconnaissance
– Cross-protocol attacks
– Hands-on with open source tools
* Understanding Radio
– Signal Processing
– Software Defined Radio
– Gnuradio
– Introduction to gnuradio concepts
– Creating a flow graph
– Analysing radio signals
– Recording specific radio signal
– Replay Attacks
* Radio IoT Protocols Overview
* Zigbee
– Introduction and protocol Overview
– Reconnaissance (Active and Passive)
– Sniffing and Eavesdropping
– Replay attacks
– Hands-on with RZUSBstick and open source tools
* BLE
– Introduction and protocol Overview
– Reconnaissance (Active and Passive) with HCI tools
– GATT service Enumeration
– Sniffing GATT protocol communication
– Reversing GATT protocol communication
– Read and writing on GATT protocol
– Fuzzing Characteristic values
– Hands-on with open source tools
* Mobile security (Android)
– Introduction to Android
– App architecture
– Security architecture
– App reversing and Analysis
* ARM
– Architecture
– Instruction Set
– Procedure call convention
– System call convention
– Reversing
– Hands-on Labs
* Device Reconnaissance
* Firmware
– Types
– Firmware updates
– Firmware analysis and reversing
– Firmware modification
– Firmware encryption
– Simulating device environment
* Conventional Attacks
* External Storage Attacks
– Symlink files
– Compressed files
* IoT hardware Overview
* Introduction to hardware
– Components
– Memory
– Packages
* Hardware Tools
– Expliot Nano
– EEPROM readers
– Jtagulator/Jtagenum
– Logic Analyzer
* Attacking Hardware Interfaces
* Hardware recon
– Hardware Reconnaissance
– Analyzing the board
– Datasheets
* Attacking Debug ports
– What are debug ports
– Importance
– UART
– Introduction
– Identifying UART interface
– Method 1
– Method 2
– Accessing sensor via UART
– Brute-forcing Custom consoles
– JTAG
– Introduction
– Identifying JTAG interface
– Method 1
– Method 2
– Extracting firmware from the microcontroller
– Run-time patching the firmware code
– Real time code analysis
* Attacking the Memory
– Where and What data is stored?
– Common memory chips and protocols
– I2C
– Introduction
– Interfacing with I2C
– Manipulating Data via I2C
– Sniffing run-time I2C communication
– SPI
– Introduction
– Interfacing with SPI
– Manipulating data via SPI
– Sniffing run-time SPI communication
Who should take this course
• Penetration testers tasked with auditing IoT
• Bug hunters who want to find new bugs in IoT products
• Government officials from defensive or offensive units
• Red team members tasked with compromising the IoT infrastructure
• Security professionals who want to build IoT security skills
• Embedded security enthusiasts
• IoT Developers and testers
• Anyone interested in IoT security
Pre-requisites
• Basic knowledge of web and mobile security
• Knowledge of Linux OS
• Basic knowledge of programming – python
What attendees should bring
• Laptop with at least 50 GB free space
• 8+ GB minimum RAM (4+GB for the VM)
• External USB access (min. 2 USB ports)
• Administrative privileges on the system
• Virtualization software – Latest VirtualBox (5.2.X) (including Virtualbox extension pack)
• Linux host machines should have exfat-utils and exfat-fuse installed (ex: sudo apt-get install exfat-utils exfat-fuse).
• Virtualization (Vx-t) option enabled in the BIOS settings for virtualbox to work
What attendees will be provided With
• Commercial IoT Devices for hands-on (only during the class)
• DIVA – IoT: custom vulnerable IoT sensor Testbed for hands-on (only during the class)
• Hardware tools for sensor analysis for hands-on (only during the class)
• eXos VM – Platform for IoT Penetration testing
• Training material/slides
• Practical IoT hacking Lab manual PDF
What to expect
• Hands-on Labs
• Reverse Engineering
• Getting familiar with the IoT security
• This course will give you a direction to start performing pentests on IoT products
What not to expect
• Becoming a hardware/IoT hackerIndividu qui par jeu, curiosité, défi personnel, souci de notoriété, ou envie de nuire cherche à pénétrer un système d’information auquel il n’a pas légitimement accès. Il ne faut pas confondre hackers et cybercriminels dont la motivation est avant tout financière. overnight. Use the knowledge gained in the training to start pentesting IoT devices and sharpen your skills.
Lien vers la description de la formation : https://hackinparis.com/trainings/#training-2019-practical-iot-hacking-3-days
Conditions
Prix de la formation : 2100 € HT
Informations complémentaires
Détail des supports remis au participant : https://hackinparis.com/trainings/#training-2019-practical-iot-hacking-3-days
En intra : non En inter : oui
Conditions repas et hébergement : repas inclus
Organisé par
SYSDREAM
Audit, Conseil
Contact inscription
Nom : Koltsidis
Prénom : Evangélia
Téléphone : 0178765570
Email : e.koltsidis@sysdream.com