Expanded Library

Specialized Attacks: Hardware Product Testing

by Matthew Lloyd Davies

This course will teach you to access firmware, analyze it and then reverse engineer it to identify weaknesses and vulnerabilities in the device.

What you'll learn

Are you a pentester who wants to move on from network, application, and cloud testing? Are you an aspiring product tester who wants to advise clients on how to better protect a new device before it goes to market? Then this course is for you. In this course, Specialized Attacks: Hardware Product Testing, you’ll learn to obtain firmware and reverse engineer it to highlight weaknesses and vulnerabilities. First, you’ll explore the different ways to access a device’s firmware, ranging from searching the internet to extracting it directly from the device’s memory. Next, you’ll discover how to analyze a binary file to understand its structure and content. Finally, you’ll learn how to reverse engineer the firmware to identify sensitive information and software vulnerabilities. When you’re finished with this course, you’ll have the skills and knowledge to obtain, analyze, and reverse engineer firmware to identify hardware weaknesses and vulnerabilities in order to better protect them.

About the author

Matt is an experienced cyber security professional working for the UK Government in the civil nuclear sector. A certified penetration tester and incident handler, he is also the author of the popular Pentest+ Specialized Attacks courses here at Pluralsight. With a background in Chemical Engineering, Matt's cyber security focus is Industrial Control Systems and the Industrial Internet of Things. And with the explosive growth of Industry 4.0, Matt is passionate about educating the next generation ... more

Ready to upskill? Get started