Prérequis

No experience in IT security required. However, some knowledge of electronics or embedded software is desirable.

Equipment provided: The electronic and computer equipment required for the exercises will be provided to participants on site:

  • Full HD screen with HDMI port
  • Keyboard and mouse
  • Pre-prepared Raspberry Pi
  • Hardsploit with training board
  • Radio analysis tools…

Public concerné

This course is aimed at people interested in security aspects related to hardware or embedded systems. Electronics enthusiasts and professionals, as well as IT security professionals (developers, architects, integrators, hardware designers, project managers).

Objectif

The aim of this training course is to understand the security weaknesses of embedded systems, master the attack techniques used by hackers so as to know how to limit the impact, learn how to secure embedded systems right from the design phase and understand the vulnerabilities so as to be able to limit the risks.

Formateur

Expert in embedded cybersecurity.

Teaching methods

  • PowerPoint presentation
  • Use of the Hardsploit IoT testing tool to carry out a hardware intrusion testing exercise
  • Interactive Web platform (Klaxoon)
  • Practical scenario for attacking/defending a mini-drone

Assessment methods

Assessments at the beginning and end of the course, quizzes, etc.

A training certificate complying with the provisions of Article L. 6353-1 paragraph 2 is issued to the trainee.

Registration deadline

5 working days before the course start date (if financed by OPCO).

Programme

UNDERSTAND THE BASICS OF HARDWARE HACKING

  • Understand the historical context of attacks on connected objects
  • Review vulnerabilities and their offensive and defensive aspects
  • Know the fundamentals of electronics
  • Take information from a target (component fingerprint)

 

HOW DO HACKERS GAIN ACCESS TO HARDWARE?

  • Present the tools and methods available for auditing a product
  • Extract sensitive data with auditing tools (HardSploit)
  • Acquire electronic signals, tools and demonstration

 

HOW TO ACCESS THE SOFTWARE

  • Present the different types of architecture (Microcontroller, FPGA), and the different direct accesses to the software via input and output interfaces (JTAG / SWD, I2C, SPI, UART, RF band ISM, etc.).
  • Firmware access via various interfaces

 

ATTACKS ON A SPECIFIC EMBEDDED SYSTEM, THE CONNECTED DEVICE (IOT)

  • Carry out a complete audit applied to our vulnerable embedded system:
    • Identify electronic components
    • Acquire electronic signals
    • Intercept and analyze electronic signals with HardSploit
    • Modify and extract firmware via JTAG debug functions with HardSploit
    • Fuzz external interfaces to detect basic embedded vulnerabilities
    • Exploit vulnerabilities (buffer overflow) during a hardware security audit

 

HOW TO SECURE YOUR HARDWARE ?

  • Discover cryptography and the different ways of securing your system and communications.
  • Understand secure design and the notion of development cycles (SDLC)
  • Understand hardware security best practices to limit risks
  • Limiting JTAG access and software vulnerabilities at the embedded level

 

HACKING WITH SDR TECHNOLOGY

  • Learn SDR audit methodology (capture, analysis, exploitation with radio software)
  • Use of tools (GQRX, GNU Radio, etc.)
  • Reverse-engineer a wireless protocol from radio emissions captured in the air (wireless communication of an LED panel).

 

“CAPTURE THE DRONE” EXERCISE

  • Present a practical scenario for attacking/defending a mini drone
  • Defend your drone and attack others using the tools and methods learned during training

Sessions

  • Date sur demande, toute l'année (Remote learning)
Je m'inscris
Vous souhaitez avoir plus d’informations ? Contactez-nous !

Tarif

  • Price intra-company : On request
  • Price Online : On request

 

2023 :

Satisfaction rate : 85%

Number of sessions : 5

Number of trainees : 27

 

REGISTRATIONS and INFORMATIONS :

  • Email : formation@serma.com
  • Tel. : +33 (0)5 57 26 29 92
  • Fax : +33 (0)5 57 26 08 98
  • Via the Contact form

Partager la formation