from life import experience as wisdom

~/posts/IoT and Hardware Hacking

<<< 2026/Apr/24 · security, iot, hardware >>>
Hardware interfaces (UART, SPI, JTAG), firmware extraction and wireless protocols for IoT security testing.

IoT security work at Talos covers a range of consumer and industrial devices — routers, cameras, NAS boxes — where the attack surface starts at the physical interface and ends at the web management console. I got into the hardware side formally through the TCM Security PJIT course in late 2024, but the resource collection here grew mostly from reading Pwn2Own writeups while preparing for firmware analysis work. These are the references I've actually used: the course modules for foundational technique and the writeup links for real-world exploit chain context.

Overview

IoT security testing covers hardware interfaces (UART, SPI, JTAG), firmware extraction and analysis and wireless protocols (BLE, ZigBee, Z-Wave).

Course: Practical Junior IoT Tester (TCM Security)

PJIT/PIPA certification, enrolled Nov 2024. Modules:

  1. Electronics for Hackers 101
  2. Multimeter and PCB analysis
  3. Electronics 201
  4. Logic analyzers and UART
  5. Hardware recon and OSINT
  6. UART shell and live enumeration
  7. SPI and firmware extraction
  8. Reverse engineering firmware
  9. Wrap-up

Reference books

Practice environments

Key attack surfaces

Pwn2Own Writeups

Real-world exploit chains on consumer IoT targets. These are useful for understanding how vulnerability classes translate to working exploits on constrained embedded systems. Primary source: Awesome Embedded Systems Vulnerability Research.

Routers

For network-side exploitation and vulnerability chaining on consumer routers.

Printers

For PostScript/PCL parsing bugs and network service exploitation on embedded print controllers.

NAS and IP Cameras

For storage protocol exploitation, authentication bypass and camera firmware analysis.

Smart Devices

For speaker and smart TV research where the attack surface includes media parsers and third-party app frameworks.

Automotive

For EV charging infrastructure and CAN-adjacent attack surfaces that are increasingly relevant to embedded automotive work.

Methodology

For end-to-end research process: hardware access, firmware extraction and fuzzing setup on real targets.

The methodology series in particular is worth reading in order — it covers the full arc from physical board access through to a working CGI exploit, which is the same sequence the PJIT course covers but with a real competition target as the case study.

See also