Monday, 03. February 2020, Tactical Network Solutions, IoT Firmware Exploitation

from 03. February 2020 - 9:00
till 07. February 2020 - 17:00

Tactical Network Solutions

Show map
0 people attending
Event description
CPE/ECE Credits: 40
Course Description This course is designed for hackers, tinkerers, and hobbyists with limited experience and an interest in embedded systems analysis and firmware evaluation techniques. It starts with a basic introduction to electronics, using a series of hands-on lab exercises to give the student a comfortable foundation using various embedded analysis tools and techniques, including exercises in extracting and analyzing flash images from live hardware. Students will learn how to identify and extract critical data in the firmware, and perform basic vulnerability analysis on embedded code.
The course continues with advanced emulation and exploitation techniques against MIPS Linux systems, including stack overflows, return to libc and return oriented programming. Students will develop buffer overflow exploits against live MIPS Linux devices using only a firmware update image - no hardware required!
The course culminates with students identifying, exploiting, and patching 0-day vulnerabilities in a real-world embedded device. At the end of the course, students will have the knowledge and experience to perform hardware and firmware analysis of commercial off-the-shelf embedded systems.
Prerequisites You will need the following to succeed in class:

Intimate familiarity with the Linux operating environment
Knowledge of common networking protocols (TCP/IP, HTTP)
Experience with programming/scripting languages (C and Python in particular)
Familiarity with any assembly language
Familiarity with IDA Pro
Experience with PC vulnerability analysis and exploitation
Experience using binwalk would be helpful, but not necessary

Course Length 5 days

Show more
Day 1 Introduction to embedded systems Identifying hardware Finding and interfacing with hardware debug ports Dumping firmware Firmware analysis and extraction Introduction to MIPS assembly
Day 2 Finding and exploiting logic flaws Firmware emulation and debugging
Day 3 Introduction to MIPS stack overflows Finding and exploiting real-world overflows Writing return-to-libc MIPS exploits
Day 4 Bypassing MIPS stack protections MIPS shellcode execution
Day 5 Exploit laboratory Cross-compiling tools for your target
Private, on-site training is available. Call +1 (443) 276–6990 or email us at

IoT Firmware Exploitation, Tactical Network Solutions event

Adam Sandler

Adam Sandler

Thursday 19. March 2020
Iliza: The Forever Tour

Iliza: The Forever Tour

Saturday 28. March 2020
Straight Up With Stassi Live
Saturday 11. April 2020
Josh Groban
Thursday 16. April 2020
Prince Royce: ALTER EGO Tour
Friday 24. April 2020
Patti LaBelle
Saturday 02. May 2020
Gabriel Iglesias: Beyond The Fluffy World Tour
Saturday 22. August 2020
Roomful of Blues
Friday 06. March 2020
Exploiting Real Time Operating Systems
Monday 24. February 2020
Find more interesting events
Get event recommendations based on your Facebook taste. Get it now!Show me the suitable events for meNot now