Embedded Hardware

Dive Into The World of Embedded Hardware Forensics! The Teel Technologies 5-day Embedded Hardware Acquisition & Analysis Forensic Training will focus on processes that examiners can use to access digital data at the logical and physical levels from sources that include: IoT, Smart TV's, Vehicle Systems, Skimmers/Shimmers, and almost every other device that utilizes a main board, controller chip and some forms of flash memory.

Description


Students will be provided with a foundation of how electronics work in relation to the techniques being used in this training. The processes taught will include tools from cost effective sources, open source resources, and commercial tools.

Students will learn how to adapt techniques like JTAG, ISP, Chip-Off, and apply it to embedded communication protocols such as SPI, i2C, UART and more, in order to exploit components and recover data from various sources like embedded code and the flash memory of controller chips. Data from these sources can then be analyzed for evidence or malware artifacts.

Prerequisites

This course is open to all digital forensic professionals.

Due to the sensitive nature of our curriculum, and industry, all potential students are subject to vetting prior to enrollment. We reserve the right to refuse registration to any person that does not meet our established criteria.</p>

Course Itinerary


Day 1 Overview

  • Introduction to IoT
  • Digital Communications
  • Smale Scale Computers
  • Logic Analyzers

Day 2 Overview

  • Electronics
  • In System Programming Connections
  • Multimeter
  • Bluetooth

Day 3 Overview

  • JTAG Signal Lines
  • Skimmers / Shimmers
  • Serial Peripheral Interface (SPI)
  • Hacking Hardware - Bus Pirate
  • Research

Day 4 Overview

  • i2C Communications
  • ASIX Programmer

Day 5 Overview

  • Applying hands-on knowledge to acquire and analyze various IoT devices

Evaluation Procedures:

All students receive a certificate of completion.

Included with Training


IoT Forensics Training Kit

Included with Training:

Embedded Hardware Forensics Toolkit

Due to frequent updates and changes in equipment, actual training and class giveaways may change.

Laptop Requirements


Digital Forensics Google Group

  • Windows PC with two (2) USB A ports.
  • Windows OS
  • macOS with Bootcamp Windows
  • macOS alone will not work (No Virtual Machines)
  • 8GB RAM (minimum)
  • 100GB storage (minimum)
  • You must have admin rights or have the admin password for software installation.
  • NOTE: ALL Windows updates should be done prior to class.

Similar courses

This in-depth 5-day training course will provide students with an elevated understanding of advanced acquisition and decoding techniques of data recovered from vehicle infotainment and navigation systems, as well as other electronic control units, using advanced data recovery and decoding techniques like Chip-off and ISP.

More Information

This course was developed with the ever-changing field of digital forensics in mind. No longer can we rely on just commercial tools and automated processes. Now more than ever, it is important to be able to diagnose inoperable devices and perform device repairs at the board level so we can obtain our data extractions.

More Information

Our 5-day Essential Smartphone Forensics training is designed for Digital Forensic Investigators who have had some introduction to mobile forensics and would like to delve deeper OR anyone who’s encountered a situation where the tools they use are not getting them the data they need.

More Information

In this 5-day class, participants will gain an in-depth understanding of today’s most useful and effective Flasher Boxes and Bootloader utilities to unlock and acquire mobile device memory. Applicable to both high-end Android devices, such as the Samsung and similar, down to the low-end devices from manufacturers such as BLU and others that use the low-cost MediaTek and Chinese chipsets, such tools and techniques enable examiners to expand their options when addressing such devices.

More Information

In the Teel Technologies 5-Day JTAG 2.0 Forensics course, students learn the latest techniques for accessing mobile devices using the JTAG technique for data recovery and device unlocking; the latest about today’s memory, and where JTAG is useful for data recovery from mobile phones and other devices.

More Information