Hardware Hacking Advanced: Implants & Espionage
Provided by QA
Overview
This one-day workshop focuses on the risks and realities of hardware espionage and supply chain compromise. It is a hands-on environment where students will detect and analyze various forms of surreptitious hardware. Each section provides details of the threat, real-world examples, and recommendations for detection/mitigation.
+
Prerequisites
Joe Grand's Hardware Hacking Basics two-day training
+
Course Outline
A. Espionage Overview
B. Hardware Implants
This one-day workshop focuses on the risks and realities of hardware espionage and supply chain compromise. It is a hands-on environment where students will detect and analyze various forms of surreptitious hardware. Each section provides details of the threat, real-world examples, and recommendations for detection/mitigation.
+
Prerequisites
Joe Grand's Hardware Hacking Basics two-day training
+
Course Outline
A. Espionage Overview
B. Hardware Implants
- Hands-on exercise: Build a keystroke-injection hardware implant, experiment with various payloads
- Hands-on exercise: Discover multiple methods of covert channel on a custom circuit board, capture/decode exfiltrated data
- Hands-on exercise: Identify functional difference between a known-good and modified device, determine resulting effect/weakness, reverse engineer the modification
- Hands-on exercise: Physical delayering of an intentionally-modified custom circuit board, identify differences in layout against known-good version, determine effect of modifications
Enquire
Start date | Location / delivery | |
---|---|---|
No fixed date | United Kingdom | Book now |
01132207150
01132207150