Black Hat Digital Self Defense USA 2006
Training

training

Black Hat USA 2007 Briefings and Training
Caesars Palace, Las Vegas July 28-29 (Weekend) & July 30-31 (Weekday)

Course Length: Two days. All course materials, lunch and two coffee breaks will be provided. A Certificate of Completion will be offered. You must provide your own laptop.

This class is limited to 24 students.

Black Hat Registration

Hands-On Hardware Hacking
and Reverse Engineering Techniques: Black Hat Edition

Joe Grand

What to bring:
Students are required to bring their own laptop running Windows XP (virtual machine running under OS X is OK) and containing a functional USB interface and a DB-9 serial port (or equivalent USB-to-serial adapter). The laptop will be used for web-based research and to control the test equipment used in the course (software and drivers will be installed, but can be removed at the end of the course).

No loaner laptops will be available. Students who do not bring a laptop or who have laptops running other operating systems may work with a willing partner for the hands-on exercises that require Window

Overview
This course is the first of its kind. We focus entirely on hardware hacking and techniques to defeat the security of hardware products. It's hands-on. Not only do we, as hackers, explore reverse engineering and hardware hacking processes through step-by-step experiments, we also look at defense mechanisms and technologies that we, as designers, can use to protect our products from attackers.

We'll guide you through an introduction to embedded security, explore the basic electronics fundamentals and common test equipment, and then dive into tips and techniques of successful circuit modifications and hardware hacking. The course culminates with an all-out assault by the students to break the security of a custom-designed circuit board.

A more detailed course outline may be found at the Grand Idea Studio website.

Learning Objectives

  • Familiarity with basic electronic components and theories
  • General use of test measurement equipment
  • Understand the mindset of a hardware hacker and why he does what he does
  • Gain a knowledge of how to successfully reverse engineer products
  • Learn about embedded security, ways to design hardware securely, and ways to defeat those mechanisms
  • Become confident that you can open a piece of hardware without breaking it (and maybe how to fix it if you do!)

By the time the student finishes the class, the student will have the confidence and experience to modify and tinker with electronics and hardware-based products, reverse engineer circuitry and new technologies, and evaluate the security of his own products. The student will also become familiar with the mindset of a hardware hacker, basic electronics concepts, and how to use common test measurement tools.

Although the course is more focused on hardware hacking techniques and the reverse engineering of existing products, the course will also examine many of the topics from a designer's point of view to enable him to properly incorporate security into his own hardware products and protect them from attackers.

All of the demonstrations, examples, and techniques taught in the course can be extrapolated into the student’s own product or situation.

Target Audience
The target audience for this course is computer security consultants, design engineers, technical management, senior management, and any other individuals that are looking for a hands-on experience of hardware hacking and reverse engineering.

The course aims to educate everyone, from the beginner hobbyist or curious computer security professional with no electronics experience, to the self-proclaimed "gadget geek." Whether you like to get your hands dirty with hacking hardware or you just are curious about how hackers will reverse engineer your products, this course will be of benefit.

What to Expect
This two-day class is a crash course in electronics, hardware hacking, and reverse engineering. The first day introduces the students to the basic concepts of hardware hacking and electronics, common hardware hacking tools, embedded security, and some hands-on techniques. The second day continues with the fundamentals of reverse engineering, more hardware hacking experiments, and a look at state-of-the-art, advanced hardware hacking techniques. The class concludes with a full-scale, hands-on hardware hacking challenge to break the security of a custom-designed circuit board performed individually or in small groups.

Students should expect to get their hands dirty with some basic electronics construction and reverse engineering exercises. The student should come into the class with an open mind and a sense of humor. Expect to leave the course with a smile on your face and a hacked circuit board around your neck.

Each student will be presented with the following materials and resources to be used and referenced throughout the course:

  • Electronics measurement tools, including a multimeter, digital oscilloscope, soldering iron, and device programmer
  • Safety equipment
  • All other necessary tools, components, and circuitry

Following successful completion of the course, each student will leave with:

  • Grand Idea Studio's custom hardware hacking training circuit board
  • CD-ROM containing the course lecture slides and copious research papers, notes, and references

Who Should Attend
The target audience for this course is computer security consultants, design engineers, technical management, senior management, and any other individuals who are looking for a hands-on experience of hacking, reverse engineering, and analyzing hardware products.

The course aims to educate everyone, from the beginner hobbyist or curious computer security professional with no electronics experience, to the self-proclaimed "gadget geek." Whether you like to get your hands dirty with hacking hardware or you just are curious about how hackers will reverse engineer your products, this course will be of benefit.

No electronics, hardware hacking, or computer security experience is necessary. Since each individual’s knowledge and skill sets vary, we start with the basic concepts to bring everyone up to speed.

What to Bring
Students are required to bring their own laptop running Windows XP (virtual machine running under OS X is OK) and containing a functional USB interface and a DB-9 serial port (or equivalent USB-to-serial adapter). The laptop will be used for web-based research and to control the test equipment used in the course (software and drivers will be installed, but can be removed at the end of the course).

No loaner laptops will be available. Students who do not bring a laptop or who have laptops running other operating systems may work with a willing partner for the hands-on exercises that require Windows

Trainer:

Grand Idea Studio

Joe Grand is an electrical engineer, prominent speaker, and prolific inventor with multiple pending patents and over a dozen commercially available products. He is the President of Grand Idea Studio, a San Francisco-based product research, development, and licensing firm, where he specializes in the design of consumer electronics and video game accessories.

Involved in computers and electronics since the age of 7, Joe has had the fortune of being a member of the legendary Boston-based hacker collective L0pht Heavy Industries, testifying before the United States Senate Governmental Affairs Committee under his nom de hack, Kingpin, and being praised as a "modern day Paul Revere" by the Senators for his research and warnings of computer security weaknesses.

Recognized for his unconventional approaches to product development and licensing, Joe is also a well-known hardware hacker, the author of two books, contributor to four others, on the technical advisory board of MAKE Magazine, and is a co-host of an upcoming engineering show for Discovery Channel.

Black Hat Registration

Course Length: Two days. All course materials, lunch and two coffee breaks will be provided. A Certificate of Completion will be offered. You must provide your own laptop.

Cost:

Regular:
Ends May 31, 2007

Late:
Ends July 19, 2007

Onsite:
Begins July 20, 2007

$2200

$2400

$2600

Black Hat Logo
(c) 1996-2007 Black Hat