Learn how to debug and exploit JTAG on IoT devices
The JTAG learning and exploitation kit by Attify is designed to help security researchers get started with Hardware exploitation using JTAG.
What all is covered:
- JTAG background and security overview
- Identifying JTAG pinouts
- Connecting GDB and OpenOCD
- Writing and Dumping data using JTAG
- Debugging and Runtime manipulation
This course would require you to have the necessary hardware of the JTAG Learning and Exploitation kit available on Attify Store here.
Need Further help?
Feel free to reach out to us at firstname.lastname@example.org for any further information.