● IoT/OT HARDWARE WORKSHOP

Foundations of Embedded Protocol Analysis & Exploitation

Learn to approach, analyze, and exploit embedded protocols through hands-on interaction with simulated hardware and authentic communication traces from real devices.

DATE

Feb 26-27, 2026

DURATION

2pm-8pm, CET

FORMAT

Live online

enriched with:

This training is delivered through custom-built, guided instruction by Cyber Helmets, using Hack The Box infrastructure and hardware-focused challenges to support hands-on learning.

 

Across two intensive online sessions, see how attackers analyze embedded systems and the communication protocols that connect their components. Work hands-on with simulated hardware targets, analyze real protocol captures from genuine devices, and apply practical exploitation techniques used by hardware security researchers, building a repeatable methodology for approaching and analyzing any embedded protocol.

● WHAT YOU’LL DO

What you’ll work on

Embedded protocol analysis & adversarial workflows

Decode and analyze embedded communication protocols to understand real-world attacker workflows.

Logic capture & dynamic behavior analysis

Analyze communication traces and dynamic behavior using a simulated hardware environment.

Embedded communication analysis

Analyze device communication logic to understand behavior, data flows, and system interactions.

Hardware analysis & component identification

Showcase real hardware workflows used to identify and access hardware interfaces and components on embedded devices.

Repeatable embedded analysis methodology

Develop a repeatable methodology for approaching and analyzing embedded protocols across different hardware devices.

Practical takeaways & reusable tooling

Leave with practical notes, reusable tooling, and a clear action plan for applying these techniques in real security assessments.

● AGENDA

Your 2-day training journey

Day 1

Understanding embedded communication through an attacker’s lens
Digital signal fundamentals for embedded communication

→ Protocol behavior patterns

→ Decoding embedded protocol captures

→ Reversing simple serial communication flows

→ Guided hands-on labs analyzing real-world communication scenarios

Day 2

Practical exploitation of embedded interfaces
→ Identifying and accessing hidden or undocumented hardware interfaces

→ Escaping restrictive debugging environments

→ Retrieving and analyzing embedded firmware

→ Discovering credentials and sensitive information stored on devices

→ ​​Achieving persistence through hardware-level techniques

→ Demonstrating debugging workflows to support deeper device analysis

→ Analyzing unknown and undocumented data formats

● INSTRUCTORS

Meet the instructors

Konstantinos S. Mokos

Security researcher and Principal Cyber Security Architect specializing in embedded systems and ICS/OT security.

Ilias Fiotakis

Senior Content Engineer with an electrical engineering background, specializing in hardware, cryptographic security, and embedded systems.

Anastasios Meletlidis

Cybersecurity researcher with I0.RS, with experience in vulnerability research, exploit development, and penetration testing across Web, IoT, and ICS/OT.

● WHAT YOU’LL GAIN

Key takeaways

→ A deep understanding of embedded communication protocols and how they are used in hardware devices.


→ Hands-on experience analyzing embedded protocols using real-world captures and signals.


→ The ability to extract sensitive information from IoT devices through hardware-level analysis

 

→ Confidence in identifying and assessing hardware interfaces on embedded devices.

 

→ The skills to analyze real-world attacker workflows when assessing the security of IoT and embedded systems.

● REQUIREMENTS & PREREQUISITES

Requirements

→ Create an HTB account in advance (VIP+ access provided as part of the workshop)

 

→ Basic familiarity with Linux command-line workflows.

 

→ A general understanding of how embedded devices communicate (high-level only, no hardware experience required).

 

→ Experience with hands-on problem solving in a technical environment such as debugging, scripting, or working with protocol/data formats.

 

→ Comfort installing and running lightweight tooling used for viewing traces, interacting with simulated hardware, and performing analysis.

● BOOK YOUR SEAT

Step into the action

Join us for two days of hands-on embedded protocol analysis and exploitation.

Book your seat
€600 (plus VAT)
What's included:
Workshop full syllabus and preparation details will be sent to all registered participants prior to the event.

Syllabus:

Intro to GCP

  • GCP Hierarchy
  • Google Workspace
  • gcloud config
  • Basic Hacking Techniques

Exploitation of GCP Services

  • IAM
  • KMS
  • Secrets 
  • Storage
  • Compute Instances & VPC
  • Cloud Functions
  • CloudSQL
  • Pub/Sub
  • App Engine
  • Google APIs
  • Cloud Shell

Methodologies

  • White box

Security Services

  • GCP Logging & Monitoring

Syllabus:

Intro to AWS

  • AWS Organization
  • AWS Principals
  • Basic Hacking Techniques

Exploitation of AWS Services

  • IAM
  • STS
  • KMS
  • Secrets Manager
  • S3
  • EC2 & VPC
  • Lambda
  • RDS
  • SQS
  • SNS

Methologies

  • White box

Common Detection Mechanisms

  • CloudTrail

Syllabus:

Azure Basics

  • Azure Organization
  • Entra ID
  • Azure Tokens & APIs
  • Basic Enumeration Tools

 

Exploitation of Azure Services

  • Entra ID IAM
  • Azure IAM
  • Azure Applications
  • Azure Key Vault
  • Azure Virtual Machine & Networking
  • Storage Accounts
  • Azure File Share
  • Azure Table Storage
  • Azure SQL Database
  • Azure MySQL & PostgreSQL
  • Azure CosmosDB
  • Azure App Service
  • Basic Azure Research Technique
  • Azure Function Apps
  • Static Web Apps
  • Azure Container Registry
  • Azure Container
  • Instances, Apps & Jobs
  • Azure Queue
  • Azure Service Bus
  • Azure Automation Account
  • Azure Logic Apps
  • Azure Cloud Shell
  • Azure Virtual Desktop

 

Methologies

  • White box
  • Black box
  • Pivoting between Entra ID & AD

 

Common Detection Mechanisms

  • Azure & Entra ID Logging & Monitoring
  • Microsoft Sentinel
  • Microsoft Defender for Cloud & Microsoft Defender EASM

Fundamentals and Setup

  1. Overview of Android’s architecture and ecosystem dynamics.
  2. Exploration of security features native to Android using Java, Kotlin, C++, and Rust.
  3. Mobile Application Threat Model
    a) Differences between mobile and web application threat models.
    b) Applying threat modeling techniques specifically to mobile applications.
    c) Case studies highlighting potential threats and vulnerabilities.
    d) How do we secure and test cross platform apps (e.g. ReactNative, Xamarin, etc).
  4. Introduction to industry mobile security standards
    a) OWASP Mobile Application Security (MAS) project
    b) Effective usage of the Mobile Application Security Verification Standard (MASVS).
    c) Effective usage of the Mobile Security Testing Guide (MSTG).
    d) Overview of the OWASP top 10 for mobile.
  5. Setting up and preparing a mobile security testing lab
    a) Configuration of industry-standard tools and guidance on their appropriate use.
    b) Setup of virtual mobile devices using Corellium, including its advantages.
    c) Introductory exercises to familiarize with the tools.
  6. Secure Coding Overview
    a) Exercises to identify vulnerabilities in code examples
    b) Discussion of the appropriate mechanisms for remediation
    c) Practical session on remediation and re-testing the app
  7. Secure storage
    a) Overview of application storage mechanisms.
    b) Introduction to cryptographic storage solutions on Android.

Advanced Techniques and Practical Application

  • Mobile penetration testing methodology
    a) Methodologies used in real-world scenarios with practical tips and tricks.
  • Identifying issues with backend APIs
    a) Examination of client-side trust issues.
    b) Analysis of insecure communications including certificate validation and pinning.
  • Cryptography in Android apps
    a) Utilization of Android’s Crypto APIs.
    b) Implementation of native cryptography using libraries like libnacl and OpenSSL.
    c) Management of cryptographic keys.
  • Authentication and Authorization
    a) Testing client-side authentication mechanisms, including secure usage of biometrics.
    b) Strategies to detect and bypass authentication flaws.
    c) Security measures for API authentication.
  • Android IPC
    a) Detailed exploration of Intents, deep links, Binders/services, and broadcast receivers.
  • Webviews
    a) Identifying and resolving common security issues in Android Webview configurations.
  • Software Composition Analysis (SBOM)
    a) Techniques to determine the components of an Android app.
    b) Identifying known vulnerabilities within these components.
  • Mobile Device Management (MDM)
    a) Introduction to Mobile Device Management: definition, core features, and its role in enhancing organizational security.
    b) Discussion on the benefits and practical applications of MDM in controlling and securing mobile devices across an enterprise.
  • Mobile Application Management (MAM)
    a) Overview of Mobile Application Management: what it entails and its significance in enterprise environments.
    b) Exploration of how MAM contributes to managing and securing applications specifically, detailing its utility for enterprise security strategies.

Advanced Techniques and Practical Application

  • Mobile penetration testing methodology
    a) Methodologies used in real-world scenarios with practical tips and tricks.
  • Identifying issues with backend APIs
    a) Examination of client-side trust issues.
    b) Analysis of insecure communications including App Transport Security issues & certificate pinning.
  • Cryptography in IOS apps
    a) Utilization of iOS’s CryptoKit & CommonCrypto APIs.
    b) Implementation of native cryptography using libraries like libnacl and OpenSSL.
    c) Management of cryptographic keys and leveraging the secure enclave.
  • Authentication and Authorization
    a) Testing client-side authentication mechanisms, including secure usage of Local Authentication (biometrics).
    b) Strategies to detect and bypass authentication flaws.
    c) Security measures for API authentication.
    d) Using Device Check and App Attest
  • iOS IPC
    a) Detailed exploration of URL schemes, deep (universal) links, and extensions.
  • Webviews
    a) Identifying and resolving common security issues in iOS Webview configurations.
  • Software Composition Analysis (SBOM)
    a) Techniques to determine the components of an iOS app.
    b) Identifying known vulnerabilities within these components.
  • Implementing App Integrity
    a) What to look for
    b) How to implement
  • Mobile Device Management (MDM)
    a) Introduction to Mobile Device Management: definition, core features, and its role in enhancing organizational security.
    b) Discussion on the benefits and practical applications of MDM in controlling and securing mobile devices across an enterprise.
  • Mobile Application Management (MAM)
    a) Overview of Mobile Application Management: what it entails and its significance in enterprise environments.
    b) Exploration of how MAM contributes to managing and securing applications specifically, detailing its utility for enterprise security strategies.

Fundamentals & Setup

  1. Overview of iOS’s architecture and ecosystem dynamics.
  2. Exploration of security features native to to iOS using Objective-C, Swift, and C(++).
  3. Mobile Application Threat Model
    a) Differences between mobile and web application threat models.
    b) Applying threat modeling techniques specifically to mobile applications.
    c) Case studies highlighting potential threats and vulnerabilities.
    d) How do we secure and test cross platform apps (e.g. ReactNative, Xamarin, etc).
  4. Introduction to industry mobile security standards
    a) OWASP Mobile Application Security (MAS) project
    b) Effective usage of the Mobile Application Security Verification Standard (MASVS).
    c) Effective usage of the Mobile Security Testing Guide (MSTG).
    d) Overview of the OWASP top 10 for mobile.
  5. Setting up and preparing a mobile security testing lab
    a) Configuration of industry-standard tools and guidance on their appropriate use.
    b) Setup of virtual mobile devices using Corellium, including its advantages.
    c) Introductory exercises to familiarize with the tools.
  6. Secure Coding Overview
    a) Exercises to identify vulnerabilities in iOS code examples
    b) Discussion of the appropriate mechanisms for remediation
    c) Practical session on remediation and re-testing the app
  7. Secure storage
    a) Overview of application storage mechanisms.
    b) Introduction to cryptographic storage solutions on iOS.