{"guid":"341d7c6a-a8c0-47ec-8c24-4f6fc8639f3f","title":"Hardsploit: A Metasploit-like tool for hardware hacking","subtitle":"A complete toolbox for IoT security ","slug":"32c3-7496-hardsploit_a_metasploit-like_tool_for_hardware_hacking","link":"https://events.ccc.de/congress/2015/Fahrplan/events/7496.html","description":"It is clear that something is needed to help the security community to evaluate, audit and control the security level of hardware products.\n\nHardsploit is a complete tool box (hardware \u0026 software), a framework which aims to:\n\n- Facilitate the audit of electronic systems for industry 'security' workers (consultants, auditors, pentesters, product designers, etc.)\n\n- Increase the level of security (and trust !) of new products designed by the industry","original_language":"eng","persons":["Yann.A","Julien MOINARD","Gwénolé Audic"],"tags":["Hardware \u0026 Making"],"view_count":58135,"promoted":false,"date":"2015-12-28T20:30:00.000+01:00","release_date":"2015-12-29T01:00:00.000+01:00","updated_at":"2026-04-05T00:15:05.106+02:00","length":3562,"duration":3562,"thumb_url":"https://static.media.ccc.de/media/congress/2015/7496-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2015/7496-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2015/341d7c6a-a8c0-47ec-8c24-4f6fc8639f3f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2015/341d7c6a-a8c0-47ec-8c24-4f6fc8639f3f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/32c3-7496-hardsploit_a_metasploit-like_tool_for_hardware_hacking","url":"https://api.media.ccc.de/public/events/341d7c6a-a8c0-47ec-8c24-4f6fc8639f3f","conference_title":"32C3: gated communities","conference_url":"https://api.media.ccc.de/public/conferences/32c3","related":[{"event_id":2172,"event_guid":"ELK9-ZQeFcqKxBYW8eay8g","weight":3},{"event_id":2224,"event_guid":"SkWIxKKgQFunVQAJT_oagA","weight":3},{"event_id":2227,"event_guid":"H1GEe9l64eUbo1oZXtLkEg","weight":2},{"event_id":2277,"event_guid":"ad722522-5817-4317-8f3d-bb443b4e6c77","weight":2},{"event_id":2332,"event_guid":"c8fe75dc-bc24-4bf7-8b6d-a5ac76c48d0e","weight":2},{"event_id":2811,"event_guid":"fa0727ab-81a7-4197-bc7d-0ce5e9dc4526","weight":4},{"event_id":2814,"event_guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","weight":3},{"event_id":2817,"event_guid":"7430c969-7ccf-4d40-903a-d9b1ebb4fb15","weight":8},{"event_id":2820,"event_guid":"1d7d4787-c77a-4e6e-9398-f3b4dcaa3587","weight":4},{"event_id":2823,"event_guid":"c6f44cff-122c-44f3-bcf9-683577a67e85","weight":2},{"event_id":2826,"event_guid":"9ab1407a-126f-48d9-898d-eae7974324e9","weight":3},{"event_id":2837,"event_guid":"9f2e9ff0-1555-470b-8743-9f07f54e9097","weight":3},{"event_id":2848,"event_guid":"658ebc92-ef93-421d-9547-f117f75eed92","weight":3},{"event_id":2850,"event_guid":"4f1a0717-6931-4580-9e49-5d523be045df","weight":2},{"event_id":2851,"event_guid":"62290f8e-f515-416f-9c4a-b403474e94e6","weight":3},{"event_id":2876,"event_guid":"144b2208-bf0b-494c-99e5-665ed18f1e8f","weight":2},{"event_id":2882,"event_guid":"df35c860-60fc-4df8-801c-b2f4f91b33b8","weight":6},{"event_id":2886,"event_guid":"088e3078-bab2-433d-8be2-f1a4b37b4d5c","weight":3},{"event_id":2907,"event_guid":"3b16ddc9-499b-44b1-9084-b3e328daea30","weight":3},{"event_id":2911,"event_guid":"60ba43d2-a9c8-42ab-a434-8772cb182675","weight":6},{"event_id":2917,"event_guid":"16613345-4f8c-44f1-a065-b3fa1d7b51cc","weight":4},{"event_id":2925,"event_guid":"e1efc11e-170c-4234-9ac0-4451a6631b01","weight":6},{"event_id":2947,"event_guid":"422ba0b9-debb-436e-9822-e9a201dec845","weight":4},{"event_id":2951,"event_guid":"2e3d2878-e8b0-44cd-aea8-baf52be25ecf","weight":2},{"event_id":2953,"event_guid":"7bf4c7a5-779e-4591-8d9b-f5f38d3dc879","weight":3},{"event_id":3601,"event_guid":"5a517be2-220b-4eb6-88c3-e7ef08c98ace","weight":3},{"event_id":3633,"event_guid":"530f0400-e4e8-4d99-909d-4cfc8121c0b0","weight":2},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":8},{"event_id":3652,"event_guid":"60b52369-b0ee-455f-904a-4dfef49596eb","weight":2},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":2},{"event_id":3708,"event_guid":"aaec73e9-66b9-46d2-aa0f-9f43018198ea","weight":2},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":2},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":2}],"recordings":[{"size":43,"length":3553,"mime_type":"audio/opus","language":"deu","filename":"32c3-7496-de-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking.opus","state":"downloaded","folder":"opus-translation","high_quality":true,"width":null,"height":null,"updated_at":"2015-12-30T01:06:28.996+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/opus-translation/32c3-7496-de-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking.opus","url":"https://api.media.ccc.de/public/recordings/9187","event_url":"https://api.media.ccc.de/public/events/341d7c6a-a8c0-47ec-8c24-4f6fc8639f3f","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":54,"length":3553,"mime_type":"audio/mpeg","language":"deu","filename":"32c3-7496-de-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking.mp3","state":"downloaded","folder":"mp3-translated","high_quality":true,"width":null,"height":null,"updated_at":"2016-01-02T19:42:41.041+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/mp3-translated/32c3-7496-de-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking.mp3","url":"https://api.media.ccc.de/public/recordings/9465","event_url":"https://api.media.ccc.de/public/events/341d7c6a-a8c0-47ec-8c24-4f6fc8639f3f","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":null,"length":null,"mime_type":"application/x-subrip","language":"eng","filename":"DRAFT_32c3-7496-en-de-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking.en_DRAFT.srt","state":"todo","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2022-01-15T17:32:27.256+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/DRAFT_32c3-7496-en-de-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking.en_DRAFT.srt","url":"https://api.media.ccc.de/public/recordings/50649","event_url":"https://api.media.ccc.de/public/events/341d7c6a-a8c0-47ec-8c24-4f6fc8639f3f","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":297,"length":3562,"mime_type":"video/mp4","language":"eng-deu","filename":"32c3-7496-en-de-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking_sd.mp4","state":"downloaded","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2016-02-03T14:13:31.018+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/h264-sd/32c3-7496-en-de-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking_sd.mp4","url":"https://api.media.ccc.de/public/recordings/9463","event_url":"https://api.media.ccc.de/public/events/341d7c6a-a8c0-47ec-8c24-4f6fc8639f3f","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":54,"length":3553,"mime_type":"audio/mpeg","language":"eng","filename":"32c3-7496-en-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking.mp3","state":"downloaded","folder":"mp3","high_quality":true,"width":null,"height":null,"updated_at":"2016-01-02T19:42:14.496+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/mp3/32c3-7496-en-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking.mp3","url":"https://api.media.ccc.de/public/recordings/9466","event_url":"https://api.media.ccc.de/public/events/341d7c6a-a8c0-47ec-8c24-4f6fc8639f3f","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":261,"length":3562,"mime_type":"video/webm","language":"eng-deu","filename":"32c3-7496-en-de-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking_webm-sd.webm","state":"downloaded","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2016-02-03T14:12:48.304+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/webm-sd/32c3-7496-en-de-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/9186","event_url":"https://api.media.ccc.de/public/events/341d7c6a-a8c0-47ec-8c24-4f6fc8639f3f","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":833,"length":3562,"mime_type":"video/mp4","language":"eng-deu","filename":"32c3-7496-en-de-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking_hd.mp4","state":"downloaded","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-02-03T14:12:06.465+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/h264-hd/32c3-7496-en-de-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking_hd.mp4","url":"https://api.media.ccc.de/public/recordings/8726","event_url":"https://api.media.ccc.de/public/events/341d7c6a-a8c0-47ec-8c24-4f6fc8639f3f","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":575,"length":3562,"mime_type":"video/webm","language":"eng-deu","filename":"32c3-7496-en-de-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking_webm-hd.webm","state":"downloaded","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-02-03T21:01:46.417+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/webm-hd/32c3-7496-en-de-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/9462","event_url":"https://api.media.ccc.de/public/events/341d7c6a-a8c0-47ec-8c24-4f6fc8639f3f","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":797,"length":3562,"mime_type":"video/mp4","language":"deu","filename":"32c3-7496-de-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking.mp4","state":"downloaded","folder":"h264-hd-web","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-02-03T14:12:06.207+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7496-de-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking.mp4","url":"https://api.media.ccc.de/public/recordings/8725","event_url":"https://api.media.ccc.de/public/events/341d7c6a-a8c0-47ec-8c24-4f6fc8639f3f","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":796,"length":3562,"mime_type":"video/mp4","language":"eng","filename":"32c3-7496-en-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking.mp4","state":"downloaded","folder":"h264-hd-web","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-02-03T14:12:05.920+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/h264-hd-web/32c3-7496-en-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking.mp4","url":"https://api.media.ccc.de/public/recordings/8724","event_url":"https://api.media.ccc.de/public/events/341d7c6a-a8c0-47ec-8c24-4f6fc8639f3f","conference_url":"https://api.media.ccc.de/public/conferences/32c3"},{"size":42,"length":3553,"mime_type":"audio/opus","language":"eng","filename":"32c3-7496-en-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking.opus","state":"downloaded","folder":"opus","high_quality":true,"width":null,"height":null,"updated_at":"2016-01-02T19:41:31.349+01:00","recording_url":"https://cdn.media.ccc.de/congress/2015/opus/32c3-7496-en-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking.opus","url":"https://api.media.ccc.de/public/recordings/9464","event_url":"https://api.media.ccc.de/public/events/341d7c6a-a8c0-47ec-8c24-4f6fc8639f3f","conference_url":"https://api.media.ccc.de/public/conferences/32c3"}]}