Attacking Real-World IoT and Embedded Devices


Instructor:  Patrick Ventuzelo
Dates:  June 15 to 18 2026
Capacity:  25


In this training, participants will learn to reverse, emulate, and fuzz real-world IoT and embedded devices commonly found in modern homes and small businesses. We focus on attacking widely-deployed targets, many of which were previously featured at Pwn2Own, using software-driven techniques, public firmware images, and real-world exploitation workflows.

Unlike traditional hardware-centric IoT trainings, our approach emphasizes firmware analysis, network interaction, emulation, and vulnerability discovery via fuzzing and reversing. Participants will work on actual devices from vendors like Home Assistant, Philips Hue, Linksys, Draytek, Netgear, Synology, Wyze, and more.


What You'll Learn



Course Outline


Day 1 – Home Automation Under Siege

Focus: Smart hubs and IoT ecosystems


Day 2 – Routers in the Crosshairs

Focus: Consumer routers and gateway devices


Day 3 – Hacked at First Sight: IP Cameras

Focus: Surveillance and video devices


Day 4 – Printers & Forgotten Peripherals

Focus: Often-overlooked devices with juicy bugs



BIO


Patrick Ventuzelo Patrick Ventuzelo is a senior security researcher, CEO & founder of Fuzzinglabs. After working for the French Ministry of Defense, he specialized in fuzzing, vulnerability research, and reverse engineering. Over the years, Patrick has created multiple fuzzers, found hundreds of bugs, and published various blog posts/videos/tools on topics like Rust, Go, Blockchain, WebAssembly, and Browser security. Patrick is a regular speaker and trainer at various security conferences around the globe, including BlackHat USA, OffensiveCon, REcon, RingZer0, PoC, ToorCon, hack.lu, NorthSec, SSTIC, and others.



To Register

Click here to register.


Hex-Rays Magnet Forensics Trail of Bits