● IoT/OT HARDWARE WORKSHOP
Learn to approach, analyze, and exploit embedded protocols through hands-on interaction with simulated hardware and authentic communication traces from real devices.
enriched with:
This training is delivered through custom-built, guided instruction by Cyber Helmets, using Hack The Box infrastructure and hardware-focused challenges to support hands-on learning.
Across two intensive online sessions, see how attackers analyze embedded systems and the communication protocols that connect their components. Work hands-on with simulated hardware targets, analyze real protocol captures from genuine devices, and apply practical exploitation techniques used by hardware security researchers, building a repeatable methodology for approaching and analyzing any embedded protocol.
● WHAT YOU’LL DO
Decode and analyze embedded communication protocols to understand real-world attacker workflows.
Analyze communication traces and dynamic behavior using a simulated hardware environment.
Analyze device communication logic to understand behavior, data flows, and system interactions.
Showcase real hardware workflows used to identify and access hardware interfaces and components on embedded devices.
Develop a repeatable methodology for approaching and analyzing embedded protocols across different hardware devices.
Leave with practical notes, reusable tooling, and a clear action plan for applying these techniques in real security assessments.
● AGENDA
Understanding embedded communication through an attacker’s lens
→ Digital signal fundamentals for embedded communication
→ Protocol behavior patterns
→ Decoding embedded protocol captures
→ Reversing simple serial communication flows
→ Guided hands-on labs analyzing real-world communication scenarios
Practical exploitation of embedded interfaces
→ Identifying and accessing hidden or undocumented hardware interfaces
→ Escaping restrictive debugging environments
→ Retrieving and analyzing embedded firmware
→ Discovering credentials and sensitive information stored on devices
→ Achieving persistence through hardware-level techniques
→ Demonstrating debugging workflows to support deeper device analysis
→ Analyzing unknown and undocumented data formats
● INSTRUCTORS

Security researcher and Principal Cyber Security Architect specializing in embedded systems and ICS/OT security.

Senior Content Engineer with an electrical engineering background, specializing in hardware, cryptographic security, and embedded systems.

Cybersecurity researcher with I0.RS, with experience in vulnerability research, exploit development, and penetration testing across Web, IoT, and ICS/OT.
● WHAT YOU’LL GAIN
→ A deep understanding of embedded communication protocols and how they are used in hardware devices.
→ Hands-on experience analyzing embedded protocols using real-world captures and signals.
→ The ability to extract sensitive information from IoT devices through hardware-level analysis
→ Confidence in identifying and assessing hardware interfaces on embedded devices.
→ The skills to analyze real-world attacker workflows when assessing the security of IoT and embedded systems.
● REQUIREMENTS & PREREQUISITES
→ Create an HTB account in advance (VIP+ access provided as part of the workshop)
→ Basic familiarity with Linux command-line workflows.
→ A general understanding of how embedded devices communicate (high-level only, no hardware experience required).
→ Experience with hands-on problem solving in a technical environment such as debugging, scripting, or working with protocol/data formats.
→ Comfort installing and running lightweight tooling used for viewing traces, interacting with simulated hardware, and performing analysis.
● BOOK YOUR SEAT
Join us for two days of hands-on embedded protocol analysis and exploitation.
To provide the best experiences, we and our partners use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us and our partners to process personal data such as browsing behavior or unique IDs on this site and show (non-) personalized ads. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Click below to consent to the above or make granular choices. Your choices will be applied to this site only. You can change your settings at any time, including withdrawing your consent, by using the toggles on the Cookie Policy, or by clicking on the manage consent button at the bottom of the screen.
Syllabus:
Intro to GCP
Exploitation of GCP Services
Methodologies
Security Services
Syllabus:
Intro to AWS
Exploitation of AWS Services
Methologies
Common Detection Mechanisms
Syllabus:
Azure Basics
Exploitation of Azure Services
Methologies
Common Detection Mechanisms
Fundamentals and Setup
Advanced Techniques and Practical Application
Advanced Techniques and Practical Application
Fundamentals & Setup