Instructor: Caleb Davis
Dates: June 15 to 18 2026
Capacity: 20
This training provides an in-depth, hands-on approach to reverse engineering embedded systems, covering firmware analysis, hardware debugging, and PCB reverse engineering. Participants will extract, analyze, and modify firmware using advanced techniques in Ghidra while learning to decode proprietary communication protocols with logic analyzers. The course also explores hardware-focused attacks, including live data exfiltration via debugging interfaces such as SPI, JTAG, and SWD, as well as chip depopulation and deadbugging methods for accessing embedded storage. Additionally, participants will reverse-engineer PCBs to map critical components, identify attack vectors, and reconstruct undocumented hardware designs.
Participants will begin with a hardware-focused approach to reverse engineering, learning how to visually inspect and document embedded devices to identify key components, debug interfaces, and potential vulnerabilities. PCB reverse engineering techniques will be covered in depth, including tracing connections, extracting board schematics, and reconstructing circuit functionality to facilitate firmware and hardware attacks.
Next, the training will focus on firmware extraction and analysis, guiding participants through various data exfiltration techniques such as direct memory access via debugging protocols, chip-off methods, and live system interaction. Using Ghidra and its specialized plugins, participants will reverse-engineer firmware to analyze structures, locate security mechanisms, and develop controlled modifications for further exploitation.
The course will conclude with an exploration of embedded security mechanisms and attack vectors, including encryption, disabled debugging interfaces, and hardware-based exploits such as glitching and fault injection. By the end, participants will have a comprehensive skill set for reverse engineering both hardware and firmware, enabling them to analyze, assess, and manipulate embedded systems effectively.
Hardware:
Software:
Prerequisites:
The training is designed for intermediate to experienced hardware hackers, developers, or cybersecurity professionals who want to expand their knowledge.
Professionals with zero to little hacking or development experience.
Caleb Davis is a founding member of the Cybersecurity organization, SolaSec. Caleb operates out of the Dallas/Fort Worth area and has a degree in Electrical Engineering from the University of Texas at Tyler. He is an inventor/patent holder and has a background in embedded hardware/software development. He leads a team of experts that regularly perform penetration testing across a wide variety of products including medical devices, ATMs, chemical control systems, security solutions, and other commercial products. Additionally, Caleb has a passion for integrating security into the product development life cycle and has helped several organizations in their approach to shifting left.
Click here to register.