Software gets much of the hacking spotlight, perhaps understandably so. But the physical infrastructure that runs all that code is just as susceptible to messing with, though it takes a different set of knowledge and techniques. Today's Training trio touch on the more solid side of that divide.
So, the box sits in front of you, its secrets beckoning. Where to start? One great place would be Hands-On Hardware Hacking and Reverse Engineering, a Training which will teach hardware-hacking and reverse-engineering techniques commonly used against electronic products and embedded systems. Topics will include tool tutorials, circuit board analysis and modification, embedded security, and common attack vectors. Pay attention, because at the end you'll have to apply these skills to defeat the security of a custom circuit board.
Next up, odds are fair you've written software before, or at least know the basics. But how about building hardware? That's precisely the goal of Make Your Own Hacker / Pentesting Gadget, in which you'll get down and dirty with off-the-shelf router innards to create a highly useful pentesting gadget. This thing can run pentest tools like Nmap, Metasploit, Aircrack-NG and so on to automate pentest tasks, create rogue devices, backdoor the firmware, and even create a wireless IDS/IPS. A handy thing to have in your pocket, and a great opportunity to smile knowingly when asked, "where'd you get that?"
Finally, Software Exploitation via Hardware Exploits is a hands-on course covering tools and methods for manipulating, modifying, debugging, reverse engineering, interacting with, and exploiting the software and hardware of embedded systems. Unfortunately, this one's sold out. Hope you got in!
Black Hat USA 2015 will occur at the Mandalay Bay resort in Las Vegas. It goes down August 1-6, so be sure to register to lock in your attendance.