Live, Hands-On Embedded Firmware Security Training in IoT Firmware Exploitation, Hardware Hacking and Exploiting Real Time Operating Systems

Share and earn Cybytes
Facebook Twitter LinkedIn Email

Always wanted to know why companies and individuals come to TNS for live, hands-on training in IoT Firmware Exploitation, Hardware Hacking and Exploiting Real Time Operating Systems?

Here’s a quick summary of the classes, which are taught by former US intelligence offensive cyber operators. They teach their students how to make jumping out of planes (and securing embedded firmware) look easy!

The IoT Firmware Exploitation course is designed for white hat hackers, tinkerers and hobbyists with limited experience and an interest in embedded systems analysis. It starts with a basic introduction to electronics, using a series of hands-on lab exercises to give the student a comfortable foundation using various embedded analysis tools and techniques. The exercises include extracting and analyzing flash images from live hardware. Students will learn how to identify and extract critical data in the firmware, and perform basic vulnerability analysis on embedded code.

The course continues with advanced emulation and exploitation techniques against MIPS Linux systems, including stack overflows, return to libc and return oriented programming. Students will develop buffer overflow exploits against live MIPS Linux devices using only a firmware update image – no hardware required!

Finally, the course culminates with students identifying, exploiting and patching 0-day vulnerabilities in a real-world embedded device. At the end of the course, students will have the knowledge and experience to perform hardware and firmware analysis of commercial, off-the-shelf embedded systems.

The Hardware Hacking Workshop takes the hard out of hardware hacking.

This is for people who want to actually understand what they’re doing!

Have you ever wanted to reverse engineer a piece of electronics, but didn’t know where to begin? Do you lack the knowledge to troubleshoot hardware hacking problems? Did your Internet resources lack the “how to” hands-on instruction?

Wouldn’t it be nice if someone could take you by the hand and elevate your hardware reverse engineering knowledge from zero to hero in a logical, well-organized manner?

The Exploiting Real Time Operating Systems course teaches students how to analyze, reverse, debug and exploit embedded RTOS firmware. It provides hands-on experience with a variety of real-world devices, RTOS’s and architectures that equip students with the practical knowledge and skills necessary to be proficient in RTOS vulnerability analysis and exploitation.


For more information or for custom training packages, contact us at 443-276-6990 and

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
About Tactical Network Solutions
Are you concerned about risky, vulnerable embedded firmware in IoT devices, connected medical devices, automotive ECUs and industrial control systems? You're not alone. Since 2007, Fortune 500 companies and governments around the world have sought out Tactical Network Solutions for reverse engineering training programs, firmware evaluations, and cyber risk mitigation strategies. Clients are excited to leverage our automated firmware evaluations and consulting performed with the proprietary Centrifuge IoT Security Platform. The evals are completed with NO access to source code on compiled images containing a Linux-based root filesystem compiled for either MIPS, ARM, or X86. We also support QNX (a real-time operating system) and Docker containers. TNS evaluations have revealed thousands of hidden attack vectors including erroneously placed private crypto keys, insecure binaries with highly vulnerable function calls and other rampant security holes on embedded firmware. Our community of clients includes firmware developers, underwriters, law firms, governments and intelligence agencies worldwide who share a common goal: to discover hidden attack vectors in IoT and connected devices.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?