Re-discovering Bugs in IoT Devices with the Qiling Framework

2-day hands-on technical training in Phuket

Re-discovering Bugs in IoT Devices with the Qiling Framework

Beginners to Intermediate security researchers wish to learn more about hacking IoT firmware and build their own security research tools on top of Qiling Framework.

$2,299.00

Duration

2-day

Delivery Method

In-Person

Level

beginner / intermediate

Seats Available

20

ATTEND IN-PERSON: Onsite in Phuket

DATE: 21-22 August 2023

TIME: 09:00 to 17:00 ICT/GMT+7

Date Day Time Duration
21 Aug Monday 0900-17:00 ICT/GMT+7 8 Hours
22 Aug Tuesday 0900-17:00 ICT/GMT+7 8 Hours

 


Exclusive content: First official training from the founder of Qiling Framework.

This course is tailored for engineers, researchers, and cybersecurity analysts who are eager to enhance their skill set with the Qiling Framework. The training offers an in-depth overview of Qiling’s cutting-edge binary emulation features, along with a systematic guide to the process of emulation and security analysis. Participants will be shown standard workflows that might be familiar from other tools, and how to harness the power of Qiling’s vast capabilities to execute these workflows more efficiently and swiftly.

In addition, the course will explore how to utilize Qiling Framework’s robust Python API, and how to use or extend its analysis outcomes to expedite your emulation process. The highlight of this course is an extensive section on IoT devices, where you’ll learn to emulate these devices and re-discover one-day bugs, starting from fuzzing an IoT device right up to hitting the bug.

 

Topics Covered:

 

  • Emulating multi-platforms and architectures
  • Handling multiple file formats
  • Sandbox code emulation in an isolated environment
  • Detailed memory, register, OS level, and filesystem level API
  • Fine-grain instrumentation: instruction/basic-block/memory-access/exception/syscall/IO/etc
  • Virtual machine level API such as save and restore current execution state
  • Cross architecture and platform debugging capabilities
  • Dynamic hotpatch on-the-fly running code, including the loaded library
  • IoT emulation and re-discovering bugs

 

 

Depending on interest, we may also delve into:
  • Emulating Windows Driver (.sys)
  • Linux Kernel Module (.ko)
  • MacOS Kernel (.kext) via Demigod

 

The final goal of this course is to enable students to be able to build their own research / reverse engineer tool on top of Qiling Framework. This will enable students to learn reverse engineering with a more efficient and fun way.

We also understand that not all students have the same background. Therefore, this course integrates several jumping-off points, allowing us to delve deeper into the specific topics that you wish to learn. This two-day course is suitable for both beginners and intermediate-level learners, promising to strengthen your understanding and use of the Qiling Framework.

Why You Should Take This Course

Beginners to Intermediate security researchers wish to learn more about hacking IoT firmware and build their own security research tools on top of Qiling Framework.

Who Should Attend

To learn,
  • Reverse engineering
  • How bug is being discover
  • How to build your own research tools

Prerequisite Knowledge

At least with basic knowledge of
  • Linux / Windows / MacOS Kernel
  • Hardware Hacking
  • Python

Hardware / Software Requirements

  • Laptop
  • Windows / MacOS / Linux
  • VMware / WSL2 / Terminal

TRAINER

Founder

Qiling Framework

KaiJern (@xwings). Founder of open source reverse engineering project, Qiling Framework (https://qiling.io). His research topic is mainly on developing cutting edge cross platform reverse engineering framework, embedded devices security, blockchain security, and various security topics.

He presented his findings in different international security conferences like Blackhat, Defcon, HITB, Codegate, QCon, KCon, Brucon, H2HC, Nullcon, etc. He conducted hardware hacking courses in various conferences around the globe.

He is also actively involved in Unicorn Engine (https://unicorn-engine.org), Capstone Engine (https://capstone-engine.org), Keystone Engine (https://keystone-engine.org) and https://hackersbage.com