Hardware Hacking and ARM Reverse Engineering training

Blog

24
- April
2018
Hardware Hacking and ARM Reverse Engineering training

Successful completion of the first edition of our custom Hardware Hacking and Reverse Engineering training!

For a whole week we have been having fun with an international group of students teaching them the basics of hacking hardware and the principles of reverse engineering applied to Internet of Things devices. It has been a very intense week in which we have been studying the most commonly used communications protocols and how to intercept them, learning to identify them and make accessible hidden connections using decapping and bus probing techniques to carry out Man-In-The-Middle attacks.

We've had time to learn how to attack microcontrollers, with practical examples of how to bypass read-only protections from various manufacturers, using tools widely available on the market and with a really low cost.

There has also been room for more advanced attacks that included the application of fuzz testing techniques in unusual interfaces, where such techniques are not usually applied.

Finally, the chapter on reverse engineering of IoT devices has allowed us to focus on specific techniques when working with ARM architectures, binaries lacking symbols, and when the information provided by the manufacturer is not available (zero-knowledge scenario).

And all this without losing sight of how it affects possible certification scenarios for standards such as Common Criteria or FIPS 140-2 in terms of requirements modeling and the security problem definition.

Our students have had a really practical experience of how to deal with the security evaluation of an IoT device, allowing them to gain first-hand experience, performing hardware and software attacks with technology available to anyone against a commercial devices. We are sure that they will be able to masterfully apply the knowledge acquired.

In this way, we open a new series of customized trainings focused on basic and intermediate level attacks applied to security hardware and IoT devices.

Don't hesitate to contact us if you need specific training tailored to your needs!

Javier Tallón/Technical Director

Expert consultant on the Common Criteria standard, and other security assurance standards in the field of the information technology (FIPS 140-2, ITSEC, ISO 27K1, SOC 2, ENS...). Javier has served as an evaluator in the Spanish CB for the country major evaluation labs. As a consultant, he has successfully accompanied national and international companies in several certification processes (to EAL5+). His experience has led him to participate as a speaker at several conferences on computer security and certification (SuperSec, Cybercamp, Navaja Negra, International Common Criteria Conference, International Cryptographic Module Conference, EUCyberact Conference). He is also Cyber Security lecturer, giving classes of Secure Software Engineering at the University of Granada and is CISSP (Certified Information Systems Security Professional) and OSCP/OSCE (Offensive Security Certified Professional & Certified Expert) certified .

In 2015 he begins to lay the foundations of what will be jtsec. He currently works as Technical Director of the evaluation lab and Chief Operations Officer (COO) of the Granada site from where the company develops most of the work. Recognized expert in various disciplines of cybersecurity (reversing, exploiting, web, ...), assumes the technical direction of most of the projects, directing and organizing the work of the team. He also leads the Research and Development area, encouraging the participation of the jtsec team in multiple Congresses.


Contact

Send us your questions or suggestions!

By sending your data you allow us to use it to resolve your doubts by sending you commercial information of interest. We will delete it when they are no longer necessary for this matter. Know your rights in our Privacy Policy.