What You Need to Know Before
You Start
Starts 9 June 2025 21:40
Ends 9 June 2025
00
days
00
hours
00
minutes
00
seconds
48 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Conference Talk
Optional upgrade avallable
Overview
Explore embedded device security, network pin tests, and hardware research. Learn about firmware analysis, intelligence gathering, and lateral movement in IoT systems.
Syllabus
- Introduction to HRES Process
- Embedded Device Security
- Firmware Analysis
- Intelligence Gathering
- Network Penetration Testing in IoT
- Hardware Research
- Lateral Movement in IoT Systems
- Practical Applications and Case Studies
- Conclusion and Future Trends
- Hands-on Lab Sessions
Overview of HRES methodologies
Importance in IoT systems
Identifying vulnerabilities in embedded devices
Techniques for securing embedded systems
Tools and techniques for extracting firmware
Firmware reverse engineering basics
Common vulnerabilities in firmware
Methods for collecting information on IoT devices
Analyzing device interaction patterns
Network scanning and device fingerprinting
Principles of network pen testing specific to IoT
Exploring communication protocols
Identifying and exploiting network vulnerabilities
Understanding hardware components of IoT devices
Tools and techniques for hardware analysis
Case studies of hardware exploitation
Techniques for maintaining persistence
Exploiting vulnerabilities for lateral movement
Mitigation strategies to prevent lateral movement
Real-world examples of IoT security breaches
Applying HRES processes in security assessment
Emerging threats in IoT security
Future directions and innovations in the HRES process
Practical exercises on firmware extraction
Simulated network pen tests on IoT setups
Experimentation with hardware hacking techniques
Subjects
Conference Talks