Software Exploitation via Hardware exploitation training (LITE)
  • Course Syllabus
  • Contact Us
  • Photos
  • Webcam Workshop!
Software Exploitation via Hardware Exploitation Training

 learn to:
reverse engineer and exploit the software of embedded devices
​& consumer electronics
(from people who've actually done it!)

Picture
Read an online "Hardware Hacking" comic book!
Picture
Join us for the 2-Day version of this course called the "Webcam Workshop". 
Picture
Get a "preview" of some of the course material in: "JTAG Explained"
"Software EXploitation Via Hardware EXploitation" or "SExViaHEx" (as we jokingly refer to it) teaches you how to reverse engineer and exploit software on embedded systems via hardware. It teaches all this against real-world Commercial Off The Shelf (COTS) products such as routers, game systems, and so-called "IoT" (Internet of Things) devices.  This course has an intense focus on results oriented vulnerability discovery (not just hardware hacking and tinkering for fun).
For:
"Makers", Tinkerers, Developers, IT Professionals, Mobile Developers, Hackers, Penetration Testers, Forensic Investigators, reverse engineers, software security auditors/analysts, software exploitation engineers, jail breakers, and anyone interested.
This course debuted to a sold out class at Black Hat 2014 and sold out again at Black Hat 2015, 2016, 2017, and 2018. 
All within a matter of weeks!
Picture
See what others have said about our trainings!

WHEN & Where:

Black Hat 2018 sold out in the first few weeks!
Picture

Reserve your seat for the next one!

Our trainings fill up pretty quickly (they are popular and unfortunately due to training materials provided, there are limited seats) so if you miss the window to reserve your seat, sign up below to get details before we make them available publicly! ​

U.S. Public training

180 Conference Center
180 Maiden Lane (2nd Floor)
New York, NY 10038

6 - 9 November 2018


(more venue details here)
Register for a seat!
​Get this training AND our "Android Exploitation" training (during the following week) for one price!

what to bring

  • A laptop (running their favorite OS) capable of connecting to wired and wireless networks.
  • Laptop must also have several available and operational USB Ports.
  • Installed and valid VMWare workstation (with working access to USB Ports and network card bridged or NATed).
  • Three button external mouse.

WHERE  THIS  TRAINING  HAS  BEEN  TAUGHT (PUBLICLY  &  PRIVATELY)... 


​ About xipiter & Senrio

Xipiter is an information security R&D consultation for private industry and government. We provide our clients with a range of software security services but we specialize in software exploitation, hardware and software reverse engineering, code-audits, embedded systems, and operating system internals. 
As of 2015 the Xipiter team became Senrio Inc, focused on bringing two unique IoT Security products to market.
Visit our Xipiter website to learn about where we've been. 
Visit our Senrio website and our blog to learn about where we're going!

See what others have said about our trainings.

Download an older training brochure!

software_hardware_exploitation_training.pdf
File Size: 530 kb
File Type: pdf
Download File

Senrio Inc 2018. All rights reserved.