IoT / Embedded Device Hacking

Contact Us

Join our International IoT/Embedded Device Hacking Training in Malaysia and Learn from World Class Experts!

Course Description

Embedded and IoT device hacking is growing concern across the globe. However, if you have never had any experience in reverse engineering or embedded system hacking, you might be afraid of getting started in. This training course is designed to help people working in the information security industry to learn basic knowledge needed to hack and reverse-engineer embedded system. The training covers embedded device hacking with UART/JTAG, dumping/parsing/extracting/analyzing firmware image, modifying firmware, detecting/analyzing embedded malware, discovering/exploiting vulnerabilities in firmware, and wireless hacking using SDR.

Course Details

  • Venue:             Condition Zebra Professional Learning Centre
  • Duration:        5 days
  • Time:               9.00am – 5.00pm

Course Outline

• Hunting for UART ports
• Hacking Embedded Device with JTAG
• Firmware Acquisition

• Basics of Reverse Engineering ARM/MIPS Code
• Embedded Device Vulnerability Assessment
• Embedded Malware Detection and Analysis

• Modifying Firmware for Fun and Profit
• Hacking Wireless Network

Prerequisite Knowledge and Requirements

• Should be familiar with using Windows, Linux and VMWare
• Should have an understanding of programming concepts, but programming experience is not mandatory
• Background knowledge in reverse code engineering and vulnerability assessment will be helpful, but not required
• Enthusiasm is a MUST.

Who Should Attend

Professionals who are working in information security industry and interested to expand their hacking and reverse engineering skills in IoT/embedded device.

What Will Be Offered To Attendees

• Training materials
• Lab instruction note
• Videos used in the course
• Linux virtual machine image containing necessary tools
• Various tools and devices used in hand-on practice

Trainers Profile

Tae-il Kim – Founder & CEO of Core Security (Korea)

Tae-il has about 20 years’ extensive lecturer experience in information security industry since 1999. He is one of the most famous instructors in Korea. He has lectured about reverse engineering, penetration testing, digital forensics, exploit writing, and embedded device hacking at Korean government agencies (Korea National Police Agency, Korea Internet Security Agency, Ministry of National Defense, Cyber Command, Republic of Korea Army, and so on) and the international institute and companies (Philippine Interpol, Hyundai Motor Group, LG Electronics, Samsung Advanced Technology Training Institute, and so on).

WanJeong Park (Chloe Park) – Research  Engineer of CoreSecurity (KOREA)

WanJeong Park graduated Sejong University in computer engineering.

In college, she studied mainly programming and has strong knowledge of C, Java. For her projects, she made anti-ransomware software by C. In addition, based on her interest in web programming, she developed university community site based on HTML5.

She has been researching in cyber security field such as malware detection, malicious document analysis, log analysis, crypto reversing, digital forensic.
For those above fields, she involved in many K-shield(Training cyber security experts projects). She delivered her knowledge successfully to participants from government organizations, militaries and police departments. Especially, she made virtual lab contents of digital forensic about leakage using external device and cloud program like dropbox.