Explore the HRES (Hardware Reverse Engineering Security) process in this 48-minute conference talk from Derbycon 7 (2017). Delve into embedded device security, network pin tests, and hardware security research, including a case study on a Bluetooth-controlled toilet. Learn about pre-engagement interactions, exploitation techniques, and post-exploit activities. Discover the tools and methods used in firmware analysis, including FCC and USPTO searches, logic analyzers, and UART interfaces. Gain insights into firmware review, memory manipulation, and SSL enablement. Understand the importance of lateral movement, reporting, and adherence to HRES standards in hardware security assessments.