وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Industrial Embedded Systems Hardware Penetration Testing

سرفصل های دوره

Unlock offensive hardware security skills with tools and tactics tailored for the ICS/OT and IIoT domain!


1 - Introduction
  • 1 -Welcome to the Course
  • 2 -Shopping List.pdf
  • 2 -Your Learning Journey and Shopping List
  • 3 -Contrasting Information Technology (IT) and Operational Technology (OT)
  • 4 -Introduction to Case Study Industrial Embedded Systems and Challenge Board
  • 5 -Framework for OT Resilience Testing and Risk Evaluation in Security Scenarios
  • 6 -Pentest Methodology and Attack Vectors
  • 7 -OSINT Leveraging FCC Filings for Hardware Hacking
  • 8 -Summary

  • 2 - Setting Up Your Hardware Hacking Lab
  • 1 -Welcome to Setting Up Your Hardware Hacking Lab
  • 2 -Safety First Four Electrical Safety Rules
  • 3 -Understanding Virtualization and Virtual Machines
  • 4 -Installation of VirtualBox
  • 5 -Kali Linux Setup and Installation Script
  • 5 -kali tools.txt
  • 6 -Link to blank bin.txt
  • 6 -Setting up the Challenge Board
  • 6 -cgmc8266u v1.zip
  • 7 -Installing the Logic Analyzer Software
  • 8 -Summary of Setting Up Your Hardware Hacking Lab

  • 3 - Circuit Board Reconnaissance
  • 1 -Welcome to Circuit Board Reconnaissance
  • 2 -Essentials for PCB Recon
  • 3 -Fundamentals Main Components on a PCB
  • 4 -IX2400 PCB Recon
  • 5 -IX2400 Using AI for Component Identification
  • 6 -IX2400 Datasheet Search
  • 7 -PCB Recon W2150A chips.pdf
  • 7 -W2150A PCB Recon
  • 8 -GPT4o response.txt
  • 8 -W2150A Using AI for Component Identification
  • 9 -W2150A Datasheet Search
  • 10 -Challenge Board Task PCB Recon
  • 11 -CGMC8266u pinout input reference.pdf
  • 11 -Challenge Board Solution PCB Recon, Component Identification, Datasheet
  • 12 -Summary of Circuit Board Reconnaissance

  • 4 - Electrical Reconnaissance
  • 1 -Welcome to Electrical Reconnaissance
  • 2 -Essentials for Electrical Recon
  • 3 -Fundamentals Current
  • 4 -Fundamentals Continuity
  • 5 -Fundamentals Voltage
  • 6 -Fundamentals Ohms Law
  • 7 -W2150A Identifying Ground and Voltage Levels
  • 8 -IX2400 Identifying Ground and Voltage Levels
  • 9 -Challenge Board Task Electrical Recon
  • 10 -Challenge Board Solution El. Recon, Identifying Ground and Voltage Levels
  • 11 -Summary of Electrical Reconnaissance

  • 5 - Signal Reconnaissance
  • 1 -Welcome to Signal Reconnaissance
  • 2 -Essentials for Signal Recon Analyzer Interface Hardware
  • 3 -Essentials for Signal Recon Analyzer Software
  • 3 -w2150a record.zip
  • 4 -Fundamentals Logic Levels
  • 5 -Fundamentals Signal Transfer Rates
  • 6 -Fundamentals Logic Analysis
  • 7 -IX2400 Capturing and Identifying Logical Signals
  • 8 -W2150A Capturing and Identifying Logical Signals
  • 9 -Challenge Board Task Signal Recon
  • 9 -chronoguard capture.zip
  • 10 -Challenge Board Solution Signal Recon, Capturing & Identifying Logical Signals
  • 11 -Summary of Signal Reconnaissance

  • 6 - Serial Reconnaissance
  • 1 -Welcome to Serial Reconnaissance
  • 2 -Essentials for Serial Recon USB-UART Interface
  • 3 -Essentials for Serial Recon Picocom
  • 4 -Fundamentals Introduction to Low Speed Serial Interfaces in Hardware Hacking
  • 5 -Fundamentals Introduction to UART
  • 6 -Fundamentals Introduction to SPI
  • 7 -IX2400 Establishing a Serial Connection
  • 8 -W2150A Establishing a Serial Connection
  • 9 -Challenge Board Task Serial Recon
  • 10 -Challenge Board Solution Serial Recon, Receiving the Bootlog
  • 11 -Summary of Serial Reconnaissance

  • 7 - Exploring the Boot Environment
  • 1 -Welcome to Exploring the Boot Environment
  • 2 -Fundamentals The Boot Environment
  • 3 -Fundamentals The Bootlog
  • 4 -IX2400 Bootlog Analysis
  • 4 -IX2400 Bootlog Analysis.txt
  • 5 -W2150A Bootlog Analysis
  • 5 -W2150A Bootlog Analysis.txt
  • 6 -Challenge Board Task Bootlog Analysis
  • 7 -Challenge Board Solution Bootlog Analysis
  • 7 -(SPOILER!) CGMC8266u Bootlog Analysis.txt
  • 8 -Summary of Exploring the Boot Environment

  • 8 - Accessing the Bootmenu
  • 1 -Welcome to Accessing the Bootmenu
  • 2 -Essentials for Accessing the Bootmenu xdotool
  • 3 -Fundamentals Access to Bootmenu Command Line Interface Bootshell
  • 4 -Fundamentals Bootshell Commands
  • 5 -IX2400 Bootshell Access with Automated Keystrokes
  • 6 -IX2400 Enumerating Bootshell Commands
  • 7 -W2150A Bootshell Access with Hidden Debug Menu
  • 8 -W2150A Enumerating Bootshell Commands
  • 9 -Challenge Board Bootshell Access Task
  • 10 -Challenge Board Bootshell Access Hints
  • 11 -Challenge Board Bootshell Access Solution
  • 12 -Challenge Board Task Bootshell Command Enumeration
  • 13 -Challenge Board Solution Bootshell Command Enumeration
  • 14 -Summary of Accessing the Bootshell

  • 9 - Analysing Non-Volatile Flash Memory and Gaining Root Access
  • 1 -Welcome to Analysing Non-Volatile Flash Memory and Gaining Root Access
  • 2 -Essentials Strings and Grep
  • 3 -Essentials Xxd
  • 4 -Essentials Hexdump Cleanup Script
  • 5 -IX2400 Dumping the Non-Volatile Flash Memory via U-Boot
  • 6 -IX2400 Uncovering Root Credentials and Gaining Root Access
  • 7 -Accessing the Non-Volatile Flash Memory via Linux
  • 8 -Challenge Board Task Dumping Non-Volatile Flash Memory
  • 9 -Challenge Board Hint Dumping Non-Volatile Flash Memory
  • 10 -Challenge Board Solution Dumping Non-Volatile Flash Memory
  • 11 -Challenge Board Task Root Access
  • 11 -label.zip
  • 11 -(SPOILER!) Factory Partition Hex Dump.txt
  • 12 -Challenge Board Solution Finding the Root Password and Gaining Root Access
  • 13 -Summary of Analysing Non-Volatile Flash Memory and Gaining Root Access

  • 10 - Obtaining Firmware Binaries
  • 1 -Welcome to Obtaining Firmware Binaries
  • 2 -Essentials Flash Programmer
  • 3 -Essentials Flashrom
  • 4 -Fundamentals Firmware for Industrial Embedded Systems
  • 5 -Fundamentals Extracting Firmware via USB
  • 6 -IX2400 Extracting the Firmware via USB Access
  • 7 -IX2400 Extracting the Firmware from the Flash Memory Chip via Flash Programmer
  • 8 -W2150A Finding Vulnerable Firmware via OSINT
  • 9 -Task Download Firmware for W2150A Using OSINT
  • 9 -(SPOILER) Link to working rom Snapshot.txt
  • 10 -Task Download Substitute Firmware for IX2400
  • 11 -Solution Download Substitute Firmware for IX2400
  • 12 -Summary of Obtaining Firmware Binaries

  • 11 - Introduction to Firmware Analysis
  • 1 -Welcome to Firmware Analysis
  • 2 -Essentials Binwalk
  • 3 -Essentials Firmwalker
  • 4 -Fundamentals Manual Inspection of Firmware for Industrial Embedded Systems
  • 5 -Entropy Analysis of IX2400 Firmware
  • 6 -Task Entropy Analysis of Firmware
  • 7 -Solution Entropy Analysis of Firmware
  • 8 -Firmware Structure Scan of IX2400
  • 9 -Task Firmware Structure Scan
  • 10 -Solution Firmware Structure Scan
  • 11 -Firmware Extraction of IX2400
  • 12 -Task Firmware Extraction
  • 13 -Solution Firmware Extraction
  • 14 -Automated IX2400 Firmware Analysis with Firmwalker
  • 15 -Task Analysis with Firmwalker
  • 16 -Solution Analysis with Firmwalker
  • 17 -Github Link.txt
  • 17 -Introduction to EMBA
  • 18 -Summary of Firmware Analysis

  • 12 - Closing
  • 1 -Recap, Goodbye and Happy Hacking!
  • 2 - Other Projects for Your Challenge Board.html
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 43735
    حجم: 2835 مگابایت
    مدت زمان: 258 دقیقه
    تاریخ انتشار: ۸ اسفند ۱۴۰۳
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید