Featured

Security Awareness Training Scenarios, Part 2: Hardware Scavenger Hunt

A hardware scavenger hunt turns security awareness training into an interactive exercise in which participants search the building for hidden devices and uncover how they could be used in real-world attack scenarios.

 

In our previously discussed scenario, participants moved around in a controlled environment and only in one room. In this second scenario, participants move throughout the entire building to search for hidden hardware. Not only does this allow you to present a larger number of tools in the training, but also you can place the hardware exactly in the places where an attacker would actually use it.

 

You can also vary the scenario and create a small competition between the groups by having several teams. Alternatively, you can store clues on the hardware itself, information that then must be analyzed after a device is found.

 

Preparation

The basic principle of the scavenger hunt is that a piece of hardware is found, and information is uncovered about the next location to search. All hardware tools that can be connected to a computer (whether loggers or BadUSBs) or to a network or that function independently are suitable for this purpose.

 

For simpler training courses, simply place a note next to the hardware about where to search next for which hardware, as shown below.

 

Hidden Hardware with a Clue to the Next Target

 

To increase motivation, introduce a playful element and incorporate a puzzle. Keep the instructions vague so that several destinations can be possible candidates for the next location. For example, you could mention a specific device nearby, such as a coffee machine or a printer. But only offer a few possibilities. If too many possible places exist, narrow the choices down. If the search takes too long, motivation will decrease. Therefore, the locations that come into question should not be too far apart.

 

You can make dealing with the topic of security even more effective by creating a brief story for each piece of hardware, perhaps a description of an attack scenario possible with the hardware, for example. This story then contains information on where to look for it.

Several Teams

If you’re conducting this training with a larger group, set up competing teams. To make the sequence different for each team, you should use digital descriptions and leave only one codeword for the hardware tools instead. Then create a description for each piece of hardware in a separate document. As described earlier, brief stories described an attack scenario can also be used in this context. Each group is assigned a description at the start. All other descriptions are password protected and can only be opened once the previous hardware with the codeword has been found. The order of the descriptions is different for each team. You should choose neutral filenames, and the password protection must of course be set for each team according to the order, as shown in this figure.

 

Allocating Hardware to Each Team

 

The teams could potentially pass codewords on to each other. To prevent this sharing and increase engagement with the hardware, you can use questions instead of codewords. For example, the description or task could include the question: “How many connections does the hardware you’ve just found have?” If the answer is too easy to guess, it can be combined with another word: “Hint: The password is structured as follows: Hardware[number of interfaces].” Then create a separate question for each piece of hardware and for each team.

 

Execution

Hide the hardware with the hints or codewords before the actual start of the training. Start with a theoretical briefing and introduce the devices deployed so that your participants have an idea of what they look like.

 

Depending on the size of the group, you can either have several teams start at different times or use the methods described earlier. As soon as the hardware has been found, a group can switch to the next hardware. The groups move through the entire building and pursue several goals during the scavenger hunt, which enables participants to learn about the real-life application of pentest hardware.

 

Conclusion

A hardware scavenger hunt transforms security awareness training from a passive learning experience into an active, memorable exercise. By placing real pentesting tools in realistic locations throughout the building, participants not only recognize what such devices look like but also understand how and where they could be used in a real attack scenario. The combination of movement, teamwork, and problem-solving reinforces technical knowledge while keeping motivation high.

 

 Editor’s note: This post has been adapted from a section of the book Hacking Hardware: The Practical Guide to Penetration Testing by Tobias Scheible. Tobias taught and conducted research in the field of IT security at Albstadt-Sigmaringen University for more than eleven years. 

 

This post was originally published 3/2026.

Recommendation

Hacking Hardware
Secure Your System Against Hardware-Based Attacks!

The best way to defend your hardware is to understand how attackers think. This guide walks you through real-world attack scenarios — USB killers, keyloggers, Wi-Fi manipulation, RFID exploits, and more — then shows you how to conduct penetration tests, run security awareness training, and put the right countermeasures in place to protect your infrastructure.

Learn More
Rheinwerk Computing
by Rheinwerk Computing

Rheinwerk Computing is an imprint of Rheinwerk Publishing and publishes books by leading experts in the fields of programming, administration, security, analytics, and more.

Comments