<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://learn.securinghardware.com/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/uart/topic/uart-1-pcb-basics/</loc><lastmod>2020-09-14T03:00:39-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/uart/topic/uart-2-pcb-electrical-analysis/</loc><lastmod>2023-09-01T10:35:59-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/analysing-testpoints/</loc><lastmod>2020-06-14T23:49:20-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/uart/topic/uart-3-signalling/</loc><lastmod>2020-11-23T21:59:08-08:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/uart/topic/uart-4-analysis/</loc><lastmod>2024-10-19T13:46:29-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/uart/topic/uart-5-common-interfaces/</loc><lastmod>2020-10-05T13:47:47-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/uart/topic/uart-6-escalating-prvileges/</loc><lastmod>2020-09-14T03:00:39-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/spi/topic/spi-1-software-access/</loc><lastmod>2020-09-14T03:00:39-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/spi/topic/spi-2-low-level-access/</loc><lastmod>2020-09-14T03:00:39-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/spi/topic/spi-3-high-level-access/</loc><lastmod>2020-09-14T03:00:39-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/spi/topic/spi-4-observation/</loc><lastmod>2020-10-03T21:45:22-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/spi/topic/spi-5-analysis/</loc><lastmod>2020-09-14T03:00:40-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/spi/topic/spi-6-signalling/</loc><lastmod>2020-09-14T03:00:40-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/jtag/topic/jtag-1-basics/</loc><lastmod>2020-09-14T03:00:40-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/jtag/topic/jtag-2-enabling/</loc><lastmod>2020-10-06T13:43:14-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/jtag/topic/jtag-3-interacting/</loc><lastmod>2025-02-25T12:21:06-08:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/jtag/topic/jtag-4-debugging/</loc><lastmod>2020-09-14T03:00:40-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/jtag/topic/jtag-5-escalating-privilege/</loc><lastmod>2020-09-14T03:00:40-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/jtag/topic/jtag-7-enabling-an-arm-system-moving-soon/</loc><lastmod>2021-11-01T16:25:59-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/jtag/topic/jtag-6-additional-topics/</loc><lastmod>2020-10-03T21:54:31-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/case-4-patching-the-kernel/</loc><lastmod>2020-06-04T22:20:20-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/case-5-patching-a-user-process/</loc><lastmod>2020-06-04T22:20:34-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/firmware/topic/firmware-1-simple-analysis/</loc><lastmod>2021-08-01T15:40:56-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/firmware/topic/firmware-2-extracting-components/</loc><lastmod>2020-10-05T01:47:21-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/firmware/topic/firmware-3-filesystem-manipulation/</loc><lastmod>2021-09-01T12:32:51-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/firmware/topic/firmware-4-flashing-it-back/</loc><lastmod>2025-04-02T00:42:39-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/firmware/topic/firmware-5-binary-manipulation/</loc><lastmod>2020-10-06T23:52:21-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/flash-friendly-file-systems/</loc><lastmod>2020-06-04T22:23:08-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/flash-history/</loc><lastmod>2020-06-14T23:30:10-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/memory-mapped-i-o/</loc><lastmod>2020-07-29T15:06:38-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/4k-paging-and-addressing/</loc><lastmod>2020-07-29T15:06:38-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/appendix-a-additional-topics/topic/building-openwrt-firmware/</loc><lastmod>2020-09-14T03:00:42-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/firmware-in-emulator/</loc><lastmod>2020-07-20T16:35:48-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/firmware-toolkits/</loc><lastmod>2020-07-20T16:35:48-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/equipment/topic/logic-analyser-bitmagic/</loc><lastmod>2020-09-14T03:00:42-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/equipment/topic/multi-i-o-device-tigard/</loc><lastmod>2020-10-06T22:49:11-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/equipment/topic/probes-and-clips/</loc><lastmod>2020-09-14T03:00:43-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/equipment/topic/multimeter-an301/</loc><lastmod>2020-09-14T03:00:42-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/equipment/topic/usb-microscope/</loc><lastmod>2020-09-14T03:00:42-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/wires-and-jumpers/</loc><lastmod>2020-07-13T16:17:47-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/equipment/topic/target-mt7620-router/</loc><lastmod>2020-09-14T03:00:43-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/target-raspberry-pi/</loc><lastmod>2020-07-13T16:17:48-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/uart/topic/uart-7-persisting-root/</loc><lastmod>2021-07-31T15:26:51-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/spi/topic/spi-7-target-preparation/</loc><lastmod>2020-09-14T03:00:40-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/spi/topic/spi-8-hardware-dump/</loc><lastmod>2025-04-24T12:55:33-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/appendix-a-additional-topics/topic/common-command-lines/</loc><lastmod>2020-09-14T03:00:42-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/appendix-a-additional-topics/topic/challenge-labs/</loc><lastmod>2020-09-14T03:00:42-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/introduction/topic/course-objectives/</loc><lastmod>2020-09-14T03:00:39-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/introduction/topic/equipment-overview/</loc><lastmod>2021-03-23T13:53:03-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/introduction/topic/navigating-course-website/</loc><lastmod>2021-11-03T10:53:00-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/appendix-a-additional-topics/topic/software/</loc><lastmod>2021-09-21T14:24:31-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/appendix-a-additional-topics/topic/router-unbricking/</loc><lastmod>2024-10-16T15:42:36-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/topic/</loc><lastmod>2020-09-07T12:31:12-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-on-a-raspberry-pi/lessons/communicating-over-a-console/topic/rpi-finding-uart-pins/</loc><lastmod>2020-09-10T02:10:04-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-on-a-raspberry-pi/lessons/communicating-over-a-console/topic/rpi-communicating-over-a-console/</loc><lastmod>2020-09-10T02:10:05-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-on-a-raspberry-pi/lessons/rpi-accessing-debug-interfaces/topic/rpi-researching-jtag-capabilities/</loc><lastmod>2020-09-10T02:10:05-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-on-a-raspberry-pi/lessons/rpi-accessing-debug-interfaces/topic/rpi-enabling-jtag/</loc><lastmod>2020-09-10T02:10:05-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-on-a-raspberry-pi/lessons/rpi-accessing-debug-interfaces/topic/rpi-interacting-with-jtag/</loc><lastmod>2020-09-10T02:10:05-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-on-a-raspberry-pi/lessons/rpi-accessing-debug-interfaces/topic/rpi-escalating-privilege-with-jtag/</loc><lastmod>2020-09-10T02:10:05-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-on-a-raspberry-pi/lessons/rpi-analyzing-firmware/topic/rpi-firmware-vs-software/</loc><lastmod>2020-09-10T02:10:05-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/jtag/topic/jtag-8-escalating-privilege-via-a-process-moving-soon/</loc><lastmod>2021-11-01T16:26:04-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/topic-2/</loc><lastmod>2020-09-13T23:10:06-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/hw-1-mapping-out-hardware-systems/</loc><lastmod>2020-09-16T23:46:31-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/hw-2-identifying-unknown-parts/</loc><lastmod>2020-09-17T02:52:30-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/topic-3/</loc><lastmod>2020-09-13T23:11:16-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/firmware/topic/firmware-6-offline-analysis/</loc><lastmod>2020-10-03T22:19:30-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/hw-3-analyzing-unknown-protocols/</loc><lastmod>2020-09-17T02:47:57-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/jtag-10-black-box-debug-tooling-moved-to-apa2/</loc><lastmod>2021-11-01T16:25:10-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-1/lessons/appendix-a-additional-topics/topic/additional-labs/</loc><lastmod>2020-10-03T22:04:42-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/jtag-9-black-box-jtag-searching-moved-to-apa2/</loc><lastmod>2021-11-01T16:25:00-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/practical-1-analyzing-hardware-vulnerabilities/</loc><lastmod>2020-09-14T03:00:41-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/practical-2-threat-modeling-hardware/</loc><lastmod>2020-09-14T03:00:41-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/practical-3-hardware-attack-risk-assessment/</loc><lastmod>2020-09-14T03:00:41-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/jtag-11-live-anaysis-moved-to-apa2/</loc><lastmod>2021-11-01T16:25:16-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/hw-4-speak-a-custom-protocol/</loc><lastmod>2020-10-07T23:06:08-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/hw-5-hardware-in-the-middle/</loc><lastmod>2020-10-07T23:08:26-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/what-is-hardware-pentesting/topic/case-study-0-the-nikon-wu-1a/</loc><lastmod>2021-11-10T11:00:43-08:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/what-is-hardware-pentesting/topic/hardware-hacking-vs-pentesting-vs-development/</loc><lastmod>2021-11-10T11:03:03-08:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/case-study-2-smart-thermostat/topic/thermostat-1-pre-engagement/</loc><lastmod>2022-01-28T16:15:47-08:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/case-study-2-smart-thermostat/topic/thermostat-2-intelligence-gathering/</loc><lastmod>2022-08-08T13:56:47-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/case-study-2-smart-thermostat/topic/thermostat-3-threat-modelling/</loc><lastmod>2021-11-18T14:22:29-08:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/topic-4/</loc><lastmod>2021-08-19T11:35:59-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/case-study-2-smart-thermostat/topic/thermostat-4-vulnerability-analysis/</loc><lastmod>2021-11-18T14:22:37-08:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/case-study-2-smart-thermostat/topic/thermostat-5-exploitation/</loc><lastmod>2022-02-23T14:48:31-08:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/case-study-2-smart-thermostat/topic/thermostat-6-post-exploitation/</loc><lastmod>2022-02-23T14:48:42-08:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/case-study-2-smart-thermostat/topic/thermostat-7-reporting/</loc><lastmod>2021-11-02T16:07:17-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/what-is-hardware-pentesting/topic/the-hardware-pentesting-process/</loc><lastmod>2021-11-10T11:06:07-08:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/case-study-1-solid-state-drive/topic/ssd-1-pre-engagement/</loc><lastmod>2021-11-18T14:14:51-08:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/case-study-1-solid-state-drive/topic/ssd-2-intelligence-gathering/</loc><lastmod>2021-11-18T14:16:13-08:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/case-study-1-solid-state-drive/topic/ssd-3-threat-modelling/</loc><lastmod>2021-11-18T14:18:18-08:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/case-study-1-solid-state-drive/topic/ssd-4-vulnerability-analysis/</loc><lastmod>2021-11-18T14:18:44-08:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/case-study-1-solid-state-drive/topic/ssd-5-exploitation/</loc><lastmod>2025-05-08T12:07:52-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/case-study-1-solid-state-drive/topic/ssd-6-post-exploitation/</loc><lastmod>2022-01-25T14:24:37-08:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/case-study-1-solid-state-drive/topic/ssd-7-reporting/</loc><lastmod>2021-11-02T16:07:15-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/case-study-2-smart-thermostat/topic/thermostat-4-5-more-intelligence-gathering/</loc><lastmod>2022-04-13T22:34:42-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/usb/topic/usb-1-basics/</loc><lastmod>2021-09-15T11:44:15-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/usb/topic/usb-2-sniffing-and-parsing/</loc><lastmod>2021-09-15T11:44:33-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/usb/topic/usb-3-simple-hid-attack-from-scratch/</loc><lastmod>2021-09-15T11:46:01-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/usb/topic/usb-4-stealthy-usb-attacks/</loc><lastmod>2021-09-15T11:45:52-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/topic-5/</loc><lastmod>2021-09-15T11:45:54-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/usb/topic/usb-5-fuzzing/</loc><lastmod>2021-09-15T11:50:06-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/usb/topic/usb-6-upcoming-usb-tools-and-techniques/</loc><lastmod>2021-09-15T11:52:40-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/pcie/topic/pcie-1-basics/</loc><lastmod>2021-09-15T11:50:36-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/pcie/topic/pcie-2-dumping-and-analyzing-memory/</loc><lastmod>2021-09-15T11:50:51-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/pcie/topic/pcie-3-bypassing-authentication/</loc><lastmod>2021-09-15T11:51:11-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/topic-6/</loc><lastmod>2021-09-15T11:51:22-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/pcie/topic/pcie-4-memory-aquisition/</loc><lastmod>2021-09-15T11:51:31-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/pcie/topic/pcie-5-kernel-implants/</loc><lastmod>2021-09-15T11:51:45-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/pcie/topic/pcie-6-upcoming-pcie-tools-and-techniques/</loc><lastmod>2021-09-15T11:52:24-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/smbus-and-iic/topic/smbus-1-basics/</loc><lastmod>2021-09-15T11:53:05-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/smbus-and-iic/topic/smbus-2-sniffing-and-parsing/</loc><lastmod>2021-09-15T11:53:22-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/smbus-and-iic/topic/smbus-3-attacking-as-a-controller/</loc><lastmod>2021-09-15T11:54:30-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/smbus-and-iic/topic/smbus-4-attacking-as-a-peripheral/</loc><lastmod>2021-09-15T11:54:26-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/jtag-and-debug/topic/jtagx86-1-enabling/</loc><lastmod>2021-09-15T11:55:50-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/jtag-and-debug/topic/jtagx86-2-escalating-privilege-via-kernel/</loc><lastmod>2021-09-15T11:55:37-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/jtag-and-debug/topic/jtagx86-3-escalating-privilege-via-a-process/</loc><lastmod>2021-09-15T11:56:19-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/bios-uefi-and-spi/topic/bios-1-software-access/</loc><lastmod>2021-09-15T11:56:59-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/bios-uefi-and-spi/topic/bios-2-hardware-access/</loc><lastmod>2021-09-15T11:57:21-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/bios-uefi-and-spi/topic/bios-3-basic-uefi-image-analysis/</loc><lastmod>2021-09-15T11:57:36-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/introduction-2/topic/x86-course-objectives/</loc><lastmod>2021-09-15T11:58:39-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-5/lessons/introduction-2/topic/x86-equipment-overview/</loc><lastmod>2021-09-15T11:58:48-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/topic/topic-7/</loc><lastmod>2021-11-03T10:44:02-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/what-is-hardware-pentesting/topic/equipment-overview-2/</loc><lastmod>2021-11-10T11:34:31-08:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/case-study-2-smart-thermostat-2/topic/thermostat-4-5-more-intelligence-gathering-2/</loc><lastmod>2025-08-05T10:03:16-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/case-study-2-smart-thermostat-2/topic/thermostat-7-reporting-2/</loc><lastmod>2025-03-17T23:52:27-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/case-study-2-smart-thermostat-2/topic/thermostat-6-post-exploitation-2/</loc><lastmod>2025-03-17T23:51:57-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/case-study-2-smart-thermostat-2/topic/thermostat-5-exploitation-2/</loc><lastmod>2025-03-17T23:50:35-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/case-study-2-smart-thermostat-2/topic/thermostat-4-vulnerability-analysis-2/</loc><lastmod>2025-03-17T23:29:07-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/case-study-2-smart-thermostat-2/topic/thermostat-3-threat-modelling-2/</loc><lastmod>2025-03-17T23:28:31-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/case-study-2-smart-thermostat-2/topic/thermostat-2-intelligence-gathering-2/</loc><lastmod>2025-03-17T23:27:02-07:00</lastmod></url><url><loc>https://learn.securinghardware.com/courses/applied-physical-attacks-2/lessons/case-study-2-smart-thermostat-2/topic/thermostat-1-pre-engagement-2/</loc><lastmod>2025-03-18T00:13:13-07:00</lastmod></url></urlset>
