-
Section 1: Introduction
9 Lessons-
Start1 Welcome to the Training
-
Start2 Your Learning Journey and Shopping List
-
Start3 Contrasting Information Technology (IT) and Operational Technology (OT)
-
Start4 Introduction to Case Study Industrial Embedded Systems and Challenge Board
-
Start5 Framework for OT Resilience Testing and Risk Evaluation in Security Scenarios
-
Start6 Pentest Methodology and Attack Vectors
-
Start7 OSINT FCC Filings
-
Start8 Summary
-
StartSection 1: Quiz
-
-
Section 2: Setting Up Your Hardware Hacking Lab
9 Lessons-
Start9 Welcome to Setting Up Your Hardware Hacking Lab
-
Start10 Safety First: Four Electrical Safety Rules
-
Start11 Understanding Virtualization and Virtual Machines
-
Start12 Installation of VirtualBox
-
Start13 Kali Linux Setup and Installation Script
-
Start14 Setting up the NodeMCU ESP8266 Challenge Board
-
Start15 Installing the Logic Analyzer Software
-
Start16 Summary of Setting Up Your Hardware Hacking Lab
-
StartSection 2: Quiz
-
-
Section 3: Circuit Board Reconnaissance
13 Lessons-
Start17 Welcome to Circuit Board Reconnaissance
-
Start18 Essentials for PCB Recon
-
Start19 Fundamentals: Main Components on a PCB
-
Start20 IX2400: PCB Recon
-
Start21 IX2400: Using AI for Component Identification
-
Start22 IX2400: Datasheet Search
-
Start23 W2150A: PCB Recon
-
Start24 W2150A: Using AI for Component Identification
-
Start25 W2150A: Datasheet Search
-
Start26 Challenge Board Task: PCB Recon
-
Start27 Challenge Board Solution: PCB Recon, Component Identification, Datasheet
-
Start28 Summary of Circuit Board Reconnaissance
-
StartSection 3: Quiz
-
-
Section 4: Electrical Reconnaissance
12 Lessons-
Start29 Welcome to Electrical Reconnaissance
-
Start30 Essentials for Electrical Recon
-
Start31 Fundamentals: Current
-
Start32 Fundamentals: Continuity
-
Start33 Fundamentals: Voltage
-
Start34 Fundamentals: Ohm's Law
-
Start35 W2150A: Identifying Ground and Voltage Levels
-
Start36 IX2400: Identifying Ground and Voltage Levels
-
Start37 Challenge Board Task: Electrical Recon
-
Start38 Challenge Board Solution: El. Recon, Identifying Ground and Voltage Levels
-
Start39 Summary of Electrical Reconnaissance
-
StartSection 4: Quiz
-
-
Section 5: Signal Reconnaissance
12 Lessons-
Start40 Welcome to Signal Reconnaissance
-
Start41 Essentials for Signal Recon: Analyzer Interface Hardware
-
Start42 Essentials for Signal Recon: Analyzer Software
-
Start43 Fundamentals: Logic Levels
-
Start44 Fundamentals: Signal Transfer Rates
-
Start45 Fundamentals: Logic Analysis
-
Start46 IX2400: Capturing and Identifying Logical Signals
-
Start47 W2150A: Capturing and Identifying Logical Signals
-
Start48 Challenge Board Task: Signal Recon
-
Start49 Challenge Board Solution: Signal Recon, Capturing & Identifying Logical Signals
-
Start50 Summary of Signal Reconnaissance
-
StartSection 5: Quiz
-
-
Section 6: Serial Reconnaissance
11 Lessons-
Start51 Welcome to Serial Reconnaissance
-
Start52 Essentials for Serial Recon: USB-UART Interface
-
Start53 Essentials for Serial Recon: Picocom
-
Start54 Fundamentals: Introduction to Low Speed Serial Interfaces in Hardware Hacking
-
Start55 Fundamentals: Introduction to UART
-
Start56 Fundamentals: Introduction to SPI
-
Start57 IX2400: Establishing a Serial Connection
-
Start58 W2150A: Establishing a Serial Connection
-
Start59 Challenge Board Task: Serial Recon
-
Start60 Challenge Board Solution: Serial Recon, Receiving the Bootlog
-
Start61 Summary of Serial Reconnaissance
-
-
Section 7: Exploring the Boot Environment
9 Lessons-
Start62 Welcome to Exploring the Boot Environment
-
Start63 Fundamentals: The Boot Environment
-
Start64 Fundamentals: The Bootlog
-
Start65 IX2400: Bootlog Analysis
-
Start66 W2150A: Bootlog Analysis
-
Start67 Challenge Board Task: Bootlog Analysis
-
Start68 Challenge Board Solution: Bootlog Analysis
-
Start69 Summary of Exploring the Boot Environment
-
StartSection 7: Quiz
-
-
Section 8: Accessing the Bootmenu
15 Lessons-
Start70 Welcome to Accessing the Bootmenu
-
Start71 Essentials for Accessing the Bootmenu: xdotool
-
Start72 Fundamentals: Access to Bootmenu Command Line Interface: Bootshell
-
Start73 Fundamentals: Bootshell Commands
-
Start74 IX2400: Bootshell Access with Automated Keystrokes
-
Start75 IX2400: Enumerating Bootshell Commands
-
Start76 W2150A: Bootshell Access with Hidden Debug Menu
-
Start77 W2150A: Enumerating Bootshell Commands
-
Start78 Challenge Board: Bootshell Access Task
-
Start79 Challenge Board: Bootshell Access Hints
-
Start80 Challenge Board: Bootshell Access Solution
-
Start81 Challenge Board Task: Bootshell Command Enumeration
-
Start82 Challenge Board Solution: Bootshell Command Enumeration
-
Start83 Summary of Accessing the Bootshell
-
StartSection 8: Quiz
-
-
Section 9: Analysing Non-Volatile Flash Memory and Gaining Root Access
14 Lessons-
Start84 Welcome to Analysing Non-Volatile Flash Memory and Gaining Root Access
-
Start85 Essentials: Strings and Grep
-
Start86 Essentials: Xxd
-
Start87 Essentials: Hexdump Cleanup Script
-
Start88 IX2400: Dumping the Non-Volatile Flash Memory via U-Boot
-
Start89 IX2400: Uncovering Root Credentials and Gaining Root Access
-
Start90 Accessing the Non-Volatile Flash Memory via Linux
-
Start91 Challenge Board Task: Dumping Non-Volatile Flash Memory
-
Start92 Challenge Board Hint: Dumping Non-Volatile Flash Memory
-
Start93 Challenge Board Solution: Dumping Non-Volatile Flash Memory
-
Start94 Challenge Board Task: Root Access
-
Start95 Challenge Board Solution: Finding the Root Password and Gaining Root Access
-
Start96 Summary of Analysing Non-Volatile Flash Memory and Gaining Root Access
-
StartSection 9: Quiz
-
-
Section 10: Obtaining Firmware Binaries
13 Lessons-
Start97 Welcome to Obtaining Firmware Binaries
-
Start98 Essentials: Flash Programmer
-
Start99 Essentials: Flashrom
-
Start100 Fundamentals: Firmware for Industrial Embedded Systems
-
Start101 Fundamentals: Extracting Firmware via USB
-
Start102 IX2400: Extracting the Firmware via USB Access
-
Start103 IX2400: Extracting the Firmware from the Flash Memory Chip via Flash Programmer
-
Start104 W2150A: Finding Vulnerable Firmware via OSINT
-
Start105 Task: Download Firmware for W2150A Using OSINT
-
Start106 Task: Download Substitute Firmware for IX2400
-
Start107 Solution: Download Substitute Firmware for IX2400
-
Start108 Summary of Obtaining Firmware Binaries
-
StartSection 10: Quiz
-
-
Section 11: Introduction to Firmware Analysis
19 Lessons-
Start109 Welcome to Firmware Analysis
-
Start110 Essentials: Binwalk
-
Start111 Essentials: Firmwalker
-
Start112 Fundamentals: Manual Inspection of Firmware for Industrial Embedded Systems
-
Start113 Entropy Analysis of IX2400 Firmware
-
Start114 Task: Entropy Analysis of Firmware
-
Start115 Solution: Entropy Analysis of Firmware
-
Start116 Firmware Structure Scan of IX2400
-
Start117 Task: Firmware Structure Scan
-
Start118 Solution: Firmware Structure Scan
-
Start119 Firmware Extraction of IX2400
-
Start120 Task: Firmware Extraction
-
Start121 Solution: Firmware Extraction
-
Start122 Automated IX2400 Firmware Analysis with Firmwalker
-
Start123 Task: Analysis with Firmwalker
-
Start124 Solution: Analysis with Firmwalker
-
Start125 Introduction to EMBA
-
Start126 Summary of Firmware Analysis
-
StartSection 11: Quiz
-





