Our Training

Delivered talk on “Backdooring DVR/NVR devices ” at Defcamp Romania 2018

Embedded devices, IoT, connected devices are growing very fast as their demand increases and innovation taking place in the industry. Due to huge demand in market, they lack in security prospect. There are many ways to attack such devices especially in DVR/NVR devices. 5 to 6 years back NSA ANT catalog leaked, they used to backdoor devices and they use to intercept/get data from the system. Due to ANT catalog leakage, Hardware implant attack were introduced in public.

Arun Mane

Delivered Arsenal Talk “DARWIN: Real World Use Cases for Covert Wireless” at BlackHat-USA 2018

Arun Mane is a Hardware, IOT and ICS Security Researcher. His areas of interest are Hardware Security, SCADA, Fault Injection, RF protocols and Firmware Reverse Engineering. He also has experience in performing Security Audits for both Government and private clients. He has presented a talk at the nullcon 2016,2017,2018 Goa, GNUnify 2017, Defcamp 2017,BsidesDelhi 2017, c0c0n x 2017,EFY 2018, Also Trainer for Practical Industrial Control Systems (ICS) hacking training and was co-Trainer for Practical IoT hacking which was delivered in HITB 2017, HIP 2017, Black Hat Asia 2018 and private clients in London, Australia, Sweden, Netherlands etc. He is an active member of null – the open Security Community and G4H Community.

Arun Mane

ECU Penetration Testing Nov 18, 2020

Arun Mane

ICS Village, IoT Village and CAR hacking Village” at Owasp Seaside 2020

The ALL Village offers a unique opportunity to explore Automotive ICS, IoT, and CAR hacking in a hands-on, three-day practical session. Attendees will learn methodologies for hardware, automotive, IoT, and ICS testing, covering topics such as ICS and DCS differences, ISA99/IEC62443, NIST 800-82 standards, PLC programming, Modbus protocols, and various cyber-attacks on ICS and telecommunications systems.

Arun Mane

Penetration Testing of ECU and FMS (2020)

Addressing their weakness requires specific skillset in cybersecurity as well as attack mitigation of vehicle industries. The mitigation part requires huge and niche expertise in vehicle industries. No one show, how to mitigate these vehicle attacks over ECU and FMS in any conference. This talk will show you how to mitigate vehicle cybersecurity attacks against CANBUS and LIN protocol over ECU and FMS.

Arun Mane

Making Anomaly Detection System(ADS) for Vehicles - CANbus and Lin Jan 15, 2020

Arun Mane

“REVERSING AND THE EXPLOITATION OF VEHICLE (CAR HACKING)”at c0c0n 2019 Kerala.

With vehicles now connected through V2X technologies, new third-party systems like fleet management tools and diagnostic toolsets are emerging but remain vulnerable. This course offers hands-on experience with real cars for testing component security, from basic to advanced levels, and includes a “Khaleesi” virtual machine with essential toolkits for ongoing security testing in vehicles, ICS, IoT, and hardware.

Arun Mane

“Making Anomaly Detection system(ADS) for Vehicles (Automotive Hacking)” at Rootcon 2019 Manila PH

Arun Mane

“ GnuRadio101” at x33fcon 2019 Poland

New generation malware and attacks have been targeting ICS and systems causing huge monetary and human life losses. ICS system still vulnerable in nature because it’s poorly understood. Penetration testing on ICS systems is a very niche field which requires in-depth knowledge and has a huge dependency in terms of the Hardware availability.

Arun Mane

"CAR Hacking" at Defcamp 2019 Romania

With vehicles increasingly connected via V2X technologies, new third-party systems like fleet management tools and diagnostic toolsets are emerging, but they remain vulnerable to cyberattacks. In the Car Hacking Village, participants will gain hands-on experience with automotive technologies, tackle realistic CTF challenges, and learn basic attack vectors for vehicle security. The village will also provide a virtual machine with necessary toolkits and offer a CANBUS hacking hardware device as a giveaway. Pre-register to secure your spot and fully engage in this unique opportunity!

Arun Mane

"Hacking ICS devices for Fun" at Defcamp 2019 Romania

New-generation malware and attacks increasingly target ICS, causing significant financial and human losses due to longstanding vulnerabilities and outdated security measures. This talk will demonstrate the vulnerabilities in third-party devices and well-known PLCs, focusing on HMIs, protocols, and hardware.

Arun Mane

Penetration Testing of Vehicle Components (ECU and FMS) 2019

With vehicles increasingly connected through V2X technologies, new third-party systems like fleet management tools and diagnostic toolsets are emerging but remain vulnerable. This talk will provide insights into mitigating cybersecurity attacks on ECU and FMS, focusing on CANBUS and LIN protocols, an area rarely covered in conferences.

Arun Mane

Hacking ICS devices/PLC's for Fun - ICS and IOT Hacking 2019

Modern malware and attacks increasingly target ICS, causing significant financial and human losses. ICS systems remain vulnerable due to their outdated security measures and the lack of security consideration since their inception. This talk will highlight vulnerabilities in third-party devices and well-known PLCs, focusing on their HMIs, protocols, and hardware.

Arun Mane

Delivered Training on “Practical ICS Hacking Master Class” at x33fcon 2019 Poland

New generation malware and attacks have been targeting ICS and systems causing huge monetary and human life losses. ICS system still vulnerable in nature because it’s poorly understood. Penetration testing on ICS systems is a very niche field which requires in-depth knowledge and has a huge dependency in terms of the Hardware availability.

Arun Mane

ICS village speaker – Nullcon 2017, c0c0n X 2017, BsidesDelhi 2017, Defcamp 2017

New generation malware and attacks have been targeting ICS and systems causing huge monetary and human life losses. Penetration testing on ICS systems is a very niche field which requires in-depth knowledge and has a huge dependency in terms of the Hardware availability. This contest/Context will concentrate on methodologies to conduct penetration testing of commercial Hardware devices such as PLCs as well as simulators.

Arun Mane