Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Demonstrating the HRES Process

via YouTube

Overview

Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
This course covers the process of Hardware Security Research and Embedded Device Security. By the end of the course, students will be able to conduct Network Pin Tests, perform Hardware Security Research, and analyze Firmware. The course teaches skills such as using tools like logic analyzers, UART, and conducting FCC and USPTO searches. The teaching method includes demonstrations and practical examples from Derbycon 7 (2017). This course is intended for individuals interested in hardware security research, embedded device security, and firmware analysis.

Syllabus

Introduction
Tim Wright
Agenda
Embedded Device Security
Network Pin Tests
Hardware Security Research
Bluetooth Controlled Toilet
BlackEnergy
Safety
Preengagement interactions
Carver
Exploit
Post Exploit
Testing Report
Whats in the box
Getting the firmware
Targets
Tools
Box
Cable modem
Header
FCC Search
USPTO Search
Flash Chip
datasheet
intelligence gathering
logic analyzer
UART
Firmware
Firmware Review
P Menu
Read Write to Memory
Enable SSL
Lateral Movement
Report Time
Report Out
Report Detail
Wrapup
HRES Standard Org

Reviews

Start your review of Demonstrating the HRES Process

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.