Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ Microsoft AZ-900
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Personal Transformation Mindfulness Life Purpose Meditation CBT Emotional Intelligence
Web Development JavaScript React CSS Angular PHP Node.Js WordPress Vue JS
Google Flutter Android Development iOS Development React Native Swift Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
Microsoft Power BI SQL Tableau Business Analysis Data Modeling Business Intelligence MySQL Data Analysis Blockchain
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Business Plan Startup Freelancing Online Business Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
Teaching & Academics Engineering Internet Of Things

Ethical Hardware Hacking

IoT Penetration Test and Forensics Analysis
Rating: 3.9 out of 53.9 (77 ratings)
12,964 students
Created by Kelvin C
Last updated 2/2021
English
30-Day Money-Back Guarantee

What you'll learn

  • Hardware Analysis (eg IoT Devices, Smart Phone)

Requirements

  • No

Description

Ethical Hardware Hacking

Module 1 – WiFi (To be published)

Students will understand the WiFi security issues, how to gather the network information, crack the encryption key and set up IDS for WiFi network.

Module 2 – Bluetooth (To be published)

Students will know the vulnerabilities of the devices using BLE, how to sniff the packets, analyse the packets or even take over the devices.

Module 3 – Zigbee (To be published)

Students will recognise the connection of devices using 802.15.4, how to eavesdrop the pairing of the devices within the mesh network and control the devices.

Module 4 – SDR (To be published)

Students can identify the frequency of the RF devices, how to capture the signal and replay it, so that can raise the awareness the use of these devices.

Module 5 – USB (Published)

Students will learn some common BadUSB devices, how to write the payload and deploy the payload, so that can prevent the attack.

Module 6 – RFID (Published)

Students will learn the vulnerability of RFID and take this opportunity to know the secret of the tag, how to clone the different types of RFID tag for analysis or even pentesting.

Module 7 – JTAG (Partially Published)

Module 8 – Chip Off (To be published)

Module 9 - Firmware (Partially Published)

Module 10 - GPS (Published)

Module 11 - Forensics (Partially Published)

Who this course is for:

  • Hardware Security Researcher, Pentester and Forensics Analyst

Course content

7 sections • 45 lectures • 3h 44m total length

  • Preview00:46
  • Preview05:16
  • Example 1 - First Payload
    08:05
  • Example 2 - Change Background
    05:06
  • Example 3 - Metasploit Attack
    07:50
  • Example 4 - Fileless Attack
    10:36
  • Preview02:28
  • USBNinja Professional Module
    01:22
  • GUI for USBNinja Professional
    00:06

  • Preview01:50
  • Preview01:15
  • Installation of Proxamark 3 RDV4
    01:30
  • Low Frequency (LF) Tag
    01:01
  • LF - Cloning HID Proximity card
    02:46
  • LF - Cloning Viking card
    02:54
  • LF - Cloning IoProx card
    03:41
  • LF - Cloning GProx card
    03:44
  • LF - Cloning AWID card
    02:39
  • High Frequency (HF) Tag
    01:19
  • HF - Cloning Mifare card UID
    03:51
  • HF - Recover Mifare card key
    07:26
  • HF - Cracking Mifare card key
    02:05
  • Bluetooth Add-on and Mobile Application
    05:22
  • Data Analysis
    04:42
  • Preview01:25
  • Installation of ChameleonMini/Tiny Professional
    02:30
  • Quick Crash
    02:51
  • Remote Attack using Chameleon
    01:06

  • Preview29:34
  • Analysis using JTAG connection
    00:24
  • Memory Extraction using RIFF Box
    00:43

  • Preview02:00

  • Introduction of Qiling Framework
    01:02
  • Example 1 - Emulation of ARM firmware
    01:41
  • Example 2 - Emulation of Windows executable file
    01:32
  • Example 3 - Emulation of Windows Registry
    01:22
  • Example 4 - Emulation of Router
    02:47

  • Preview02:01
  • Spoofing Location
    10:50
  • Demonstration on iOS14
    03:10
  • Featured Function
    08:55

  • Preview51:52
  • Preview04:23
  • Preview04:28
  • Preview02:12

Instructor

Kelvin C
Hardware Analysis and Forensics Research
Kelvin C
  • 4.2 Instructor Rating
  • 85 Reviews
  • 13,006 Students
  • 3 Courses

Kelvin is independent researcher and recognised as the honoree of ISLA APAC in 2016. With more than 10 years experience in forensics field as a practice lead in cyber forensic, he is well-recognized for his expert ability to investigate cyber crime based upon sound detective methodology and gave opinions at the Court as an Expert Witness. He is the only Asian speaker standing at the stage of the top 3 forensics conferences: HTCIA US, SANS DFIR Summit and DFRWS EU; and published researches in different famous computer security conference like DEFCON, HITB, HITCON, AVTokyo, ISC2 APAC.  He is also the workshop trainer in CodeBlue and HITCON.

Conference Speaker:

- The Declaration of Hacker (TDOH), Taiwan : Practical Chip-off Analysis

- Hack In The Box (HITB) CommSec Talk, Amsterdam Netherland : Digging Deep: How to find and exploit bugs in IoT Devices

- Hacker’s Party, Tokyo : Secret of IoT

- The Declaration of Hacker (TDOH), Taiwan : How a security researcher escape from an isolated country-

- ISC2 APAC Congress : Hardware Exploitation

- AVTokyo : Advanced Practical Mobile Device Analysis

- AvTokyo Security Conference : Black DDoS Kungfu, Japan version

- DragonCon HK : Advanced Practical Mobile Device Analysis

- SANS Digital Forensics and Incident Response (DFIR) Summit, US : Investigation and Intelligence Framework

- Hack In Taiwan Conference (HITCON) : Advanced Mobile Phone Forensics

- Hack In Taiwan Conference (HITCON) : WeChat Analysis in a Live System

- International Conference on Cyber Crime and Computer Forensics (ICCCF) in Macau : SCADA/ICS Hacking and Forensics Analysis

- International Conference on Cyber Crime and Computer Forensics (ICCCF) in Taiwan : Mac Memory Forensics

- Digital Forensics Research Workshop, Europe (DFRWS EU) : Real Network Forensics Kungfu

- Counter eCrime Operations Summit (CeCOS) VIII of Anti-Phishing Work Group (APWG) : Best Practice in Network Forensics

- DEF CON 20 Las Vegas, US : DDoS Black and White Kungfu – Revealed

- High-Tech Crime Investigation Association, APAC (HTCIA) : Network Attacks Investigation

- High-Tech Crime Investigation Association, APAC (HTCIA) : Facebook Forensics

********************************************************************

Workshop Trainer:

- Hack in Taiwan Conference (HITCON) : Basic IoT Analysis

- Hack in Taiwan Conference (HITCON) : Advanced Mobile Device Analysis using JTAG and Chip-off

- Code Blue Security Conference, Tokyo : JTAG and Chip Off Forensics

- High-Tech Crime Investigation Association (HTCIA) Main Conference, US : Advanced Mobile Device Analysis via JTAG and Chip-off

********************************************************************

Village Organiser:

- DEFCON 27 Las Vegas, US : Variety eXploitation Village

- DEFCON 26 Las Vegas, US – Chip Off Village

- DEFCON Beijing, China 1.0 : Variety Exploitation Village

- DEFCON Beijing, China Beta : Chip Off Village

- InfoSec In The City, Singapore : VXCON Village

- Hack In Taiwan Conference (HITCON) : Chip-off Village

- Hack In The Box (HITB), Abu Dhabi : Chip-off Village

- Hack In The Box (HITB), Dubai : Chip Off Village

- Hack In The Box (HITB) Amsterdam Netherland : Chip Off Village

- 京麒國際安全峰會, Beijing China : Geek Village

- Hardware Security Conference in The Hague – Chip Off Village

- AVTokyo Security Conference : Electronic Badge Challenge

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.