Software Exploitation via Hardware Exploitation Training
learn to:
reverse engineer and exploit the software of embedded devices
& consumer electronics
(from people who've actually done it!)
Join us for the 2-Day version of this course called the "Webcam Workshop".
|
Get a "preview" of some of the course material in: "JTAG Explained"
|
"Software EXploitation Via Hardware EXploitation" or "SExViaHEx" (as we jokingly refer to it) teaches you how to reverse engineer and exploit software on embedded systems via hardware. It teaches all this against real-world Commercial Off The Shelf (COTS) products such as routers, game systems, and so-called "IoT" (Internet of Things) devices. This course has an intense focus on results oriented vulnerability discovery (not just hardware hacking and tinkering for fun).
For:
"Makers", Tinkerers, Developers, IT Professionals, Mobile Developers, Hackers, Penetration Testers, Forensic Investigators, reverse engineers, software security auditors/analysts, software exploitation engineers, jail breakers, and anyone interested. |
This course debuted to a sold out class at Black Hat 2014 and sold out again at Black Hat 2015, 2016, 2017, and 2018.
All within a matter of weeks! |
WHEN & Where:
Black Hat 2018 sold out in the first few weeks!
Reserve your seat for the next one!
Our trainings fill up pretty quickly (they are popular and unfortunately due to training materials provided, there are limited seats) so if you miss the window to reserve your seat, sign up below to get details before we make them available publicly!
U.S. Public training
180 Conference Center
180 Maiden Lane (2nd Floor) New York, NY 10038 6 - 9 November 2018 (more venue details here) |
what to bring
- A laptop (running their favorite OS) capable of connecting to wired and wireless networks.
- Laptop must also have several available and operational USB Ports.
- Installed and valid VMWare workstation (with working access to USB Ports and network card bridged or NATed).
- Three button external mouse.
WHERE THIS TRAINING HAS BEEN TAUGHT (PUBLICLY & PRIVATELY)...
About xipiter & Senrio
Xipiter is an information security R&D consultation for private industry and government. We provide our clients with a range of software security services but we specialize in software exploitation, hardware and software reverse engineering, code-audits, embedded systems, and operating system internals.
As of 2015 the Xipiter team became Senrio Inc, focused on bringing two unique IoT Security products to market.
Visit our Xipiter website to learn about where we've been.
Visit our Senrio website and our blog to learn about where we're going!
Visit our Senrio website and our blog to learn about where we're going!
Download an older training brochure!

software_hardware_exploitation_training.pdf | |
File Size: | 530 kb |
File Type: |