Sale!

Beginner’s Guide to IoT and Hardware Hacking

Original price was: $25.00.Current price is: $10.00.

Price: 10.00 USD | Size: 6.03 GB |  Duration : 12.47 Hours  | 70+ Video Lessons | Bonus : IoT Exploitation PDF Guides  

BRAND:

ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️ 4.9

Description

Price: 10.00 USD | Size: 6.03 GB |  Duration : 12.47 Hours  | 70+ Video Lessons | Bonus : IoT Exploitation PDF Guides  

BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️ 4.9

Beginner’s Guide to IoT and Hardware Hacking

Learn to perform security research and testing on IoT devices and hardware.

Course Overview

The Beginner’s Guide to IoT and Hardware Hacking course teaches foundational skills and techniques required to get started performing security research and testing on IoT devices and hardware. This course focuses mainly on the hardware aspects of IoT hacking and how to use the underlying access to physical hardware to aid in and amplify the ability to hunt for vulnerabilities. While this course is a “beginners” level for IoT and Hardware Hacking the difficulty level as an overall cybersecurity course is intermediate. This course is open to everyone but has been specifically created for students who are familiar with software-based penetration testing (such as network, web and mobile) and want to learn how to bridge those skills over to IoT and Hardware testing.

Requirements:

·    A general understanding of penetration testing methods and methodology and a general understanding of Linux are strongly recommended.

·        A computing environment (Windows, Linux, or Mac*) capable of running a virtual machine with at least 8GB of RAM and 40GB of disk space. *Note that new MacBook Pros with the M1 chip are unable to run virtual machines such as the ones demonstrated in this course.

·        If you want to follow along with all the hands-on portions of the course, you’ll need to purchase the physical equipment and tools used in the course; you can find a full list in the second lesson of the course which is available for preview. Note that some hands-on portions of the course can be completed without physical hardware.

Topics Covered:

·        Electrical engineering and electronics fundamentals

·        Understanding and identifying common electronic components

·        How to use common hardware hacking tools such as digital multimeters, logic analyzers, USB to serial adapters and flash programmers

·        An optional lesson on soldering

·        Performing OSINT and recon on hardware

·        How to read and interpret datasheets

·        Common IoT protocols such as UART and SPI

·        Initiating and using a serial shell

·        Firmware extraction methods

·        Firmware analysis and reverse engineering

 

Course Curriculum – 13 Hours
Section 0 – Course Introduction
0.1 – Course Intro
(7:21)
0.2 – Required Equipment and Tooling
0.3 – Course Resources

0.4 – Watch This Before Opening Your Router Box
(1:13)

0.5 – Ethical Hacking and Responsible Disclosure
(3:11)

0.6 – Course Discord

Testing Notes
Testing Notes

Section 1 – Electrical Engineering For Hackers 101
1.1 – Section Intro
(1:02)

1.2 – What is Electricity Part 1
(9:25)

1.3 – What is Electricity Part 2
(6:38)

1.4 – Electrical Engineering Fundamentals: Schematics, Voltage Source, Resistors and Ohm’s Law
(4:34)

1.5 – Electrical Engineering Fundamentals: Kirchov’s Voltage Law and Series Circuits
(4:54)

1.6 Electrical Engineering Fundamentals: Parallel Circuits and Kirchov’s Current Law
(9:01)

1.7 – Circuit Lab Simulation Demo
(5:22)

1.8 – Reading Schematics
(6:50)

1.9 – Section Challenge
(5:26)

1.10 – Section Challenge Solution
(15:35)

Section 2 – Hands on with PCBs and Multimeters
2.1 – Electrical Lab Safety
(11:12)

2.2 – Opening the Router
(5:54)

2.3 – ESD Precautions
(9:11)

2.4 – Intro to PCBs
(10:07)

2.5 – Intro to Digital Multimeters
(5:56)

2.6 – Measuring Voltage with DMM
(9:14)

2.7 – Measuring Resistance with DMM
(5:35)

2.8 – Measuring Continuity with DMM
(5:44)

2.9 – Measuring Current with DMM
(7:08)

Section 3 – Electrical Engineering for Hackers 201
3.1 – AC / DC
(11:11)

3.2 – Capacitors
(17:10)

3.3- Demoing Filters with Circuit Lab
(10:32)

3.4 – Inductors
(12:25)

3.5 – Diodes
(16:09)

3.6 – Transistors
(14:36)

3.7 – Transistor Circuit Lab Example
(13:40)

3.8 – Electronic Communications and Signals
(17:42)

Section 4 – Hands on with Logic Analyzers and UART
4.1 – Intro to UART Part 1
(16:12)

4.2 – Attaching Header Pins (Solderless)
(12:06)

4.3 – Attaching Header Pins (With Solder – Optional)
(15:10)

4.4 – Logic Analyzers, Sigrok and Pulseview
(14:41)

4.5 – Intro to UART Part 2
(15:35)

4.6 – Hardware Hacking CTF
(15:03)

Section 5 – Initial Recon and OSINT
5.1 – IoT Architecture and Attack Surface
(14:39)

5.2 – Internet Facing IoT Devices
(11:30)

5.3 – Hardware OSINT via FCC ID
(9:28)

5.4 – Embedded System Components
(7:41)

5.5 – Locating and Reading Datasheets
(18:35)

5.6 – Locating Firmware Online
(3:16)

5.7 – Network Setup
(9:34)

5.8 – NMAP Scans
(6:02)

5.9 – Exploring Past CVEs
(5:18)

5.10 – Section and Notes Review
(10:39)

Section 6 – UART Shell and Live Enumeration
6.1 – Initiating UART Shell
(12:17)

6.2 – Boot Logs and Boot Loader
(17:29)

6.3 – Using TFTP to Exfil Files
(11:38)

6.4 – Using TFTP to Transfer Tools onto Devices
(11:03)

6.5 – Hunting Interesting Files and Passwords
(12:17)

6.6 – Reviewing Files and Cracking Passwords
(10:06)

6.7 – Checking Running Processes and Network Connections
(6:06)

6.8 – Prompting Additional Console Logging
(9:26)

6.9 – Serial Connections via Python
(11:07)

6.10 – Tricky UART Connections
(12:23)

6.11 – Troubleshooting UART
(5:28)

6.12 – Section and Notes Review
(9:30)

Section 7 – SPI and Firmware Extraction/Analysis
7.1 – Firmware Extraction Methods
(4:59)

7.2 – Serial Peripheral Interface Part 1
(16:56)

7.3 – Serial Peripheral Interface Part 2
(21:03)

7.4 – Extracting Firmware from ROM
(12:59)

7.5 – Firmware Analysis
(19:02)

7.6 – Inspecting Firmware and Manual Firmware Extraction
(14:46)

7.7 – Enumerating Root File System
(10:51)

Section 8 – Reverse Engineering Firmware
8.1 – Intro to Reverse Engineering
(8:02)

8.2 – Reverse Engineering Decryption Function Part 1
(12:39)

8.3 – Reverse Engineering Decryption Function Part 2
(11:28)

8.4 – Decrypting Config Files
(14:10)

8.5 – Reviewing util_execSystem for Command Injection
(15:36)

8.6 – Tracing Function Calls
(12:06)

8.7 – Section and Notes Reviews
(9:11)

Section 9 – End of Course Challenge and Course Wrap-Up
9.1 – End of Course Challenge
(21:16)

9.2 – Course Wrap-Up
(5:51)


Discover more from Expert Training

Subscribe to get the latest posts sent to your email.

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

You may also like…