Chcon2025

Introduction to Hardware Hacking
2025-10-29 , Training room 3

Sam Shute is a Technical Director at Bastion Security and leads the Hardware Hacking practice. This class will walk through the standard process of hardware hacking, including Reconnaissance, Logic Analysis, Debug Access, Extracting Flash, and Reverse Engineering.


Getting started with hardware hacking can be a daunting process. There are so many different technologies involved and so many things to buy that it can be become a blocker from ever actually hacking anything. This training will walk through some of the more common technologies you will see, what you will need to interact with them and hands-on testing to give it a go!

This is a perfect course for learners, hobbyist hackers, or experienced hackers that haven't dived into hardware stuff yet.

The topics covered include:
* Device OSINT
* Hardware examination and component identification
* Threat mapping
* Logic Analysis
* Debug port access over UART
* Extracting SPI Flash
* Reverse Engineering

All tooling will be provided. However please bring a laptop that you have administrator access to with either Ubuntu as the host OS or an Ubuntu Virtual Machine. If you are unable to bring a laptop then there will be ways to still give everything a go.

At least limited electrical engineering and Linux experience would be beneficial.

If you already understand the fundamentals of glitching or sidechannel attacks then you are probably too experienced for this training.

Sam has always been interested in the intersections of security and the physical world. In the past this has led to projects on backdooring RFID readers, 3D printing keys, and attacking payWave credit cards. As a day job Sam is a Director at Bastion Security Group.