mirror of
https://github.com/fkie-cad/awesome-embedded-and-iot-security.git
synced 2025-02-01 18:04:59 -05:00
Fraunhofer Paid Trainings added
This commit is contained in:
parent
3b2d26a81b
commit
6cb79124ae
12
readme.md
12
readme.md
@ -25,7 +25,9 @@ They are easy to use and you do not need to be an expert to get first meaningful
|
|||||||
- [Books](#books)
|
- [Books](#books)
|
||||||
- [Research Papers](#research-papers)
|
- [Research Papers](#research-papers)
|
||||||
- [Case Studies](#case-studies)
|
- [Case Studies](#case-studies)
|
||||||
- [Free Training](#free-training)
|
- [Trainings](#trainings)
|
||||||
|
- [Free Training](#free-training)
|
||||||
|
- [Paid Training](#paid-training)
|
||||||
- [Websites](#websites)
|
- [Websites](#websites)
|
||||||
- [Conferences](#conferences)
|
- [Conferences](#conferences)
|
||||||
|
|
||||||
@ -121,8 +123,9 @@ s](http://www.s3.eurecom.fr/docs/usenixsec14_costin.pdf)
|
|||||||
- [Pwning the Dlink 850L routers and abusing the MyDlink Cloud protocol](https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html)
|
- [Pwning the Dlink 850L routers and abusing the MyDlink Cloud protocol](https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html)
|
||||||
- [PWN Xerox Printers (...again)](https://www.fkie.fraunhofer.de/content/dam/fkie/de/documents/xerox_phaser_6700_white_paper.pdf)
|
- [PWN Xerox Printers (...again)](https://www.fkie.fraunhofer.de/content/dam/fkie/de/documents/xerox_phaser_6700_white_paper.pdf)
|
||||||
|
|
||||||
|
## Trainings
|
||||||
|
|
||||||
## Free Training
|
### Free Training
|
||||||
|
|
||||||
- [Hardware Hacking 101](https://github.com/rdomanski/hardware_hacking/tree/master/my_talks/Hardware_Hacking_101) - Workshop @ BSides Munich 2019.
|
- [Hardware Hacking 101](https://github.com/rdomanski/hardware_hacking/tree/master/my_talks/Hardware_Hacking_101) - Workshop @ BSides Munich 2019.
|
||||||
- [IoTGoat](https://github.com/scriptingxss/IoTGoat) - IoTGoat is a deliberately insecure firmware based on OpenWrt.
|
- [IoTGoat](https://github.com/scriptingxss/IoTGoat) - IoTGoat is a deliberately insecure firmware based on OpenWrt.
|
||||||
@ -131,6 +134,11 @@ s](http://www.s3.eurecom.fr/docs/usenixsec14_costin.pdf)
|
|||||||
- [Rhme-2015](https://github.com/Riscure/RHme-2015) - First riscure Hack me hardware CTF challenge.
|
- [Rhme-2015](https://github.com/Riscure/RHme-2015) - First riscure Hack me hardware CTF challenge.
|
||||||
- [Embedded Security CTF](https://microcorruption.com) - Microcorruption: Embedded Security CTF.
|
- [Embedded Security CTF](https://microcorruption.com) - Microcorruption: Embedded Security CTF.
|
||||||
|
|
||||||
|
### Paid Training
|
||||||
|
|
||||||
|
- [Einführung in die Firmware Analyse](https://www.cybersicherheit.fraunhofer.de/de/kursangebote/schadsoftwareanalyse/einfuehrung-in-die-firmware-analyse.html) :de:
|
||||||
|
- [Fortgeschrittene Firmware Analyse](https://www.cybersicherheit.fraunhofer.de/de/kursangebote/schadsoftwareanalyse/fortgeschrittene-firmware-analyse.html) :de:
|
||||||
|
|
||||||
|
|
||||||
## Websites
|
## Websites
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user