
This course serves as an introduction to IoT hacking, where we look at familiar devices and lay the groundwork for hardware security analysis.
Course Length: 16 Hours
Next scheduled date: WWHF Deadwood 2025 - Link at bottom.
Description
As we move further and further into the age of the Internet of Things (IoT) we are increasingly surrounded by devices that collect, analyze, and share information about the world around us. This course serves as an introduction to IoT hacking, where we look at familiar devices and lay the groundwork for hardware security analysis.
IoT devices are currently being developed and deployed to optimize processes, analyze natural phenomenon, diagnose and treat medical conditions, automate mundane tasks, and create additional conveniences for the human race. Some of these devices simply over share information that we may consider private. Others may be subverted to pose a threat to society or personal safety.
The crowd-funding and maker movements have also spawned a new class of non-traditional hardware development revenue streams. This rapid prototyping and rush to market environment is excellent for innovation. However, initial offerings may be completely void of security features. In the hardware world, lack of security features can be very difficult, if not impossible, to overcome. Once a device makes it into the hands of consumers, it may remain in service with latent vulnerabilities for a very long period of time. Typical consumers also lack the ability to distinguish between secure and insecure alternatives existing in the market. In many cases, the deciding factor driving purchase is device cost.
As a result, the security community must begin to understand and develop test methodologies for these types of devices so vulnerabilities can be discovered and communicated in the same responsible nature that occurs in the general computing world.
This course will serve as an introduction to IoT hacking, where we look at familiar devices and lay the groundwork for hardware security analysis.
System Requirements
-
Student Requirements
- At least 60GB of free hard drive space
- Minimum of 8GB of RAM
- X86 processor-based PC
- VMWare installed
- PDF reader for Slides
- NOTE: VMs will not run on ARM based PCs.
Syllabus
In this two-day training class, the following course outline will be covered along with the opportunity to hack on several different IoT devices.
Hardware Identification
-
- Types of Hardware
-
- Electricity
-
- Safety
-
- Components
Tools
-
- Types of tooling
-
- Applications of different tool
Attack Surface Analysis
-
- Identifying the Attack Surfaces for specific devices
-
- Types of Attack Surfaces
Testing Methodology
-
- Reconnaissance
-
- Scanning
-
- Exploitation
-
- Post-Exploitation
Firmware Acquisition
-
- How to dump firmware from a device
-
- Use of tools to acquire and analyze firmware
Static Analysis
-
- Analysis of information collected from the device (code, firmware, etc.)
Dynamic Analysis
-
- Analysis while interacting with the device (webpage, SSH, Bluetooth, etc.)
Other Pentesting Disciplines
-
- How do they relate to IoT hacking
Labs
-
- Several labs that demonstrate other attack vectors which were not demonstrated during class
-
- Lots of hands-on learning
About the Instructors

Rick Wisser

David Fletcher
Bio
David Fletcher has been working for Black Hills Information Security (BHIS) as a Security Analyst since 2015. He has spent most of his career working for the US Air Force and engaged in a variety of disciplines within the IT industry including boundary defense, web and application development, system administration, and offensive cyber research. David approaches penetration testing with a creative mind, treating each test as a puzzle and always exploring new methods of exploitation. He holds a BS in Electrical Engineering and an MS in Information Security Engineering from the SANS Technology Institute. Outside of work, David enjoys playing the guitar, hunting, and fishing.
This class is being taught at Wild West Hackin’ Fest – Deadwood 2025.
For more information about our conferences, visit Wild West Hackin’ Fest!
Clicking on the button above will take you to our registration page
Related products
-
Multiple InstructorsLive
Workshop: Telemetry to Tactics: A Hands-On Detection Engineering Workshop with Hal Denton
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: The Hitchhiker’s Guide To Social Engineering with Cameron Cartier
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLiveOD
PECSEC Out of the Box: Strategies for Escaping from Containers with Cory Sabol
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: Introduction to Cloud Security with Beau Bullock
View Course