{"id":106,"date":"2016-07-17T23:18:19","date_gmt":"2016-07-17T23:18:19","guid":{"rendered":"http:\/\/www.samuelhuntley.com\/?p=106"},"modified":"2016-11-03T02:53:12","modified_gmt":"2016-11-03T02:53:12","slug":"embedded-device-security-course-pwn-linux-operating-system-devices","status":"publish","type":"post","link":"https:\/\/www.samuelhuntley.com\/?p=106","title":{"rendered":"Embedded Device Security Course: Pwn Linux Operating System Devices"},"content":{"rendered":"<p>This course is an introduction for the reader into the wonderful world of embedded device exploitation.The course is supposed to be a tutorial guide that helps a reader understand the various skills required for hacking an embedded device. As the world is getting more and more into the phenomenon of &#8220;Internet of Things&#8221;, such skill sets can be useful to hack from a simple intelligent light bulb to hacking into a car.<\/p>\n<p>This course book goes into details of exploiting MIPS and ARM based devices. Also it focuses on teaching how to bypass DEP and ASLR protection in embedded devices.<\/p>\n<p><a href=\"http:\/\/www.samuelhuntley.com\/wp-content\/uploads\/2016\/07\/embedded4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-107\" src=\"http:\/\/www.samuelhuntley.com\/wp-content\/uploads\/2016\/07\/embedded4-222x300.png\" alt=\"embedded4\" width=\"222\" height=\"300\" srcset=\"https:\/\/www.samuelhuntley.com\/wp-content\/uploads\/2016\/07\/embedded4-222x300.png 222w, https:\/\/www.samuelhuntley.com\/wp-content\/uploads\/2016\/07\/embedded4.png 275w\" sizes=\"(max-width: 222px) 100vw, 222px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/www.amazon.com\/Embedded-Device-Security-Course-Operating\/dp\/1519602456\/ref=sr_1_8\/000-9701188-2690166?s=books&amp;ie=UTF8&amp;qid=1468796266&amp;sr=1-8&amp;refinements=p_27%3AMr+Samuel+Huntley\">Buy it at Amazon<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This course is an introduction for the reader into the wonderful world of embedded device exploitation.The course is supposed to be a tutorial guide that helps a reader understand the various skills required for hacking an embedded device. As the world is getting more and more into the phenomenon of &#8220;Internet of Things&#8221;, such skill &hellip; <a href=\"https:\/\/www.samuelhuntley.com\/?p=106\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Embedded Device Security Course: Pwn Linux Operating System Devices<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"_links":{"self":[{"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/posts\/106"}],"collection":[{"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=106"}],"version-history":[{"count":1,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/posts\/106\/revisions"}],"predecessor-version":[{"id":108,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/posts\/106\/revisions\/108"}],"wp:attachment":[{"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=106"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=106"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=106"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}