Skip to content
CyberEd Essentials

Pwning Smart Scales with API & Hardware Hacks


Course
Upgrade subscription below

Eugene Lim of Open Government Products explains how weak device identity, firmware access and API logic enable large-scale compromise of smart weighing machines.

Connected health devices increasingly blend hardware, mobile software and cloud APIs, expanding the attack surface in ways many manufacturers underestimate. Smart weighing machines illustrate how weak device identity, flawed association logic and insecure backend design can turn low-risk consumer hardware into large-scale compromise vectors.

By examining common manufacturing practices, reused OEM platforms and exposed debug interfaces, this session explores how attackers pivot from local device access to cloud-level control.

In this session, led by Eugene Lim, lead cybersecurity engineer at Open Government Products, you will learn:

  • Why static identifiers fail at scale;
  • How flawed authentication and association logic enable unauthorized pairing;
  • Chaining hardware, mobile and API weaknesses to achieve mass device takeover.
 

 

Here is the course outline:

Pwning Millions of Smart Weighing Machines With API and Hardware Hacking

Completion

The following certificates are awarded when the course is completed:

CPE Credit Certificate

Floating Button