Publication date : 02/16/2024

Course : Hacking and Pentesting: embedded architectures

Practical course - 4d - 28h00 - Ref. HAE
Price : 2460 € E.T.

Hacking and Pentesting: embedded architectures




The basic architecture is usually made up of a central processing unit (CPU), an operating system (or specific software) and its connectivity: these are all components vulnerable to attack, which need to be assessed and protected, not forgetting the countermeasures to be deployed.


INTER
IN-HOUSE
CUSTOM

Practical course in person
Disponible en anglais, à la demande

Ref. HAE
  4d - 28h00
2460 € E.T.




The basic architecture is usually made up of a central processing unit (CPU), an operating system (or specific software) and its connectivity: these are all components vulnerable to attack, which need to be assessed and protected, not forgetting the countermeasures to be deployed.


Teaching objectives
At the end of the training, the participant will be able to:
Defining the impact and scope of a vulnerability
Understand hacker techniques and counter their attacks
Measuring the security level of an embedded architecture
Perform a penetration test

Intended audience
Security managers and architects. System and network technicians and administrators.

Prerequisites
Good knowledge of IS security, networks, systems (especially Linux) and programming. Or knowledge equivalent to the course "System and network security, level 1" (ref. FRW).

Course schedule

1
Embedded architectures

  • Ordinary and embedded computer systems.
  • The different types of embedded architectures.
  • The various constraints linked to the embedded solution.

2
Hacking and security

  • Forms of attack, modus operandi, players, stakes.
  • Audits and penetration tests.

3
The embedded environment

  • Network: 4G, LTE, LoRA, WiFi, MQTT, 802.11.15.4, ZigBee, Z-Wave, 6LoWPAN and BLE (Bluetooth LE).
  • Firmware, the device's operating system: Windows, Linux x86/x64 bits or Raspbian.
  • Encryption: protects communications and data stored on the device.
  • Hardware: chip, chipset, Storagestorage, JTAG, UART ports, sensors, camera, etc.), port, sensor, camera.
  • Architecture: ARM, MIPS, SuperH, PowerPC.
  • System structure, components, protection and updates.

4
Embedded architecture vulnerabilities

  • The search for vulnerabilities.
  • Authentication mechanisms.
  • Connections between an embedded system and its environment (connectivity): network, sensor and peripheral.
  • Identify and use applications and programs hosted on an embedded system.
  • Intrusion testing methodology.
  • Tools: analyzers, debuggers, disassemblers and decompilers.
Hands-on work
Measure the security level of an embedded architecture.

5
The attacks

  • Physical attacks.
  • Hardware: access to various components.
  • Wireless connectivity, communication protocol. Emission analysis.
  • Software: file system structure, vulnerability of hosted applications, access to services via applications.
  • Testing exception handling with a program, exhaustion attacks.
  • System reprogramming.
  • Introduction of falsified information.
Hands-on work
Access an embedded system via various attacks. Perform a penetration test.

6
The audit report

  • Contents.
  • Sections not to be overlooked.
Hands-on work
Complete a pre-filled report.


Dates and locations

Dernières places
Date garantie en présentiel ou à distance
Session garantie
From 9 to 12 June 2026
FR
Paris La Défense
Registration
From 20 to 23 October 2026
FR
Paris La Défense
Registration

PARIS LA DÉFENSE
2026 : 9 June, 20 Oct.