Exploiting the Smart Devices (IoT).
About:

syllabus:
Introduction & Briefings

    - Android Native Code
    - Android app Reverse Engineering
    - Top vulnerabilities in Android
    - ARM basics
    - Buffer overflow on ARM architecture

Introduction to IOT
- SPI
    Introduction
    Read/write SPI
    Dumping data from SPI

- I2c
    Introduction
    Read/write I2C
    Dumping data from I2C

- UART
    Introduction
    Interacting with UART interface

- Reverse engineering
- Zigbee Exploitation
- BLE exploitation
What to expect ?

    Hands-on Labs
    Reversing binaries and apps
    Getting familiar with the IoT security
    This course will give you a direction to start performing pentests on IoT devices

Trainers,
Sneha Rajguru and Arun Mane

Please note: All tools used during the workshop are under FOSS.
 
 

Pre-requisites:
Basic knowledge of web and mobile security Basic knowledge of Linux OS Basic knowledge of programming (C, python) would be a plus
X