c0c0n is a 19 years old platform that is aimed at providing opportunities to showcase, educate, understand and spread awareness on Information Security, data protection, and privacy...
The immense power of connected and embedded systems comes with equally significant responsibility — hardware security. As innovation in embedded design, microcontrollers, and smart devices accelerates at an unprecedented pace, security often struggles to keep up. When vulnerabilities exist at the hardware level, the consequences can extend far beyond data breaches — affecting safety, reliability, and even human lives. Ignoring hardware security is no longer an option.
“Practical IoT Hacking” is a specialized course designed to provide security professionals with a deep and practical understanding of IoT/Embedded systems and their inherent weaknesses. This training goes beyond theory, offering extensive hands-on labs that enable participants to identify, analyze, exploit, and remediate hardware, firmware and protocol-level vulnerabilities on real devices — not simulations.
The course explores the hardware, firmware, and radio protocol attack surface across modern IoT/embedded systems used in various domains. Participants will gain ground-up knowledge of widely used hardware protocols and interfaces, understand internal working, and examine real-world attack scenarios targeting UART, JTAG, SPI, I²C, bootloaders, memory components, and more.
In addition to on-bus protocol-level attacks, the training covers hardware exploitation techniques using Fault injection attacks. The training will cover the fundamentals of Fault injection attacks, parameters in FI attacks, and using the voltage glitching attack to bypass the authentication. The training also includes firmware extraction, memory dumping, firmware binary analysis, and debugging interface abuse. Attendees will also work with essential open-source tools and hardware components that form the foundation of a hardware security toolkit.
Throughout the course, we use purpose-built lab setups created specifically for hardware penetration testing, along with custom in-house vulnerable boards designed to provide realistic attack scenarios and practical learning experiences.
This course is intended for security professionals who want to deepen their expertise and specialize in embedded security. If you are ready to move beyond software and explore the lower layer, this journey is for you.
Becoming a hardware/IoT hacker overnight. Use the knowledge gained in the training to start pen-testing IoT devices and sharpen your skills