- Security managers
- Security engineers
- IT professionals
- IT auditors with interest in hacking
Participants should have fundamental insight into operating systems. Digital electronics, soldering and embedded systems knowledge is not required but is an advantage.
Day 1
- Introduction
- Communication protocols and ports theory
- How to analyse an Integrated Circuit (IC) and look for important components/backdoors
- Communication protocols and ports practical analysis
Day 2
- Understanding embedded memory types and function
- Soldering, unsoldering and dumping memories
- Common hardware countermeasures used by vendors
Day 3
- Modifying, reversing firmware
- Capture the flag exercise on hardware
- Recap