Component 01 opensourceComponent 02 opensourceComponent 03 opensourceComponent 04 opensourceComponent 05 opensourceComponent 06 opensourceBoard base opensource
PCB Traces
Our board is
100% open source
All design files are available on GitHub, allowing you to understand, assemble, and customize the board.
Versatile architecture
Visual feedback
The 0.96" OLED screens provide real-time visual feedback of your interactions with the board.
Natively protected
Thanks to its integrated components, the board is protected against overvoltage and handling errors.
Board's screen
ESP32STM32
PCB Traces
One board, two chips
The DVID v2 board integrates two complete and modern environments: ESP32 and STM32.
Multiple protocols
The board supports various communication protocols, offering multiple connection options.
Wi-Fi
BLE 5.2
UART
I2C
SPI
JTAG
Extensive challenges
Capture the flag
Targeted exercises to train on specific vulnerabilities and methodologies for analysis and exploitation.
CTF

Victory of Samothrace

Analyze network traffic to extract confidential information.

Wi-Fi

30m
Easy
CTF

Lungo Motion Detector

Disable a motion detector remotely by exploiting an MQTT protocol flaw.

MQTT

30m
Easy
CTF

Louvre Security System

Gain administrator access by exploiting a flaw in internal software.

UART

1h00
Medium
CTF

The Golden Scarab

Inspect inter-component communications and retrieve exchanged data.

Logic signals

1h20
Hard
Escape games
Test your skills in extended exercises across multiple domains.
Escape game

Copernic Industries BBQ

You work for Copernic Industries and the CISO asks you to investigate a security flaw affecting the flagship BBQ product.

It seems your subcontractor has been compromised and a backdoor may be deeply installed in the product. You have one hour to investigate find the backdoor and attempt to neutralize it.

IoT
Firmware
Reverse engineering
Bluetooth
1h30
Medium
Workshops
Hands-on workshops to explore different aspects of IoT security.
Workshop

DVID/WOCSA Workshop

This workshop offers a hands-on introduction to exploiting UART ports on the DVID board, focusing on the STM32 side. Participants learn to correctly connect the UART port to the STM32F103 microcontroller, dump and analyze the firmware, observe its behavior in real-time, and extract artifacts or indicators useful for reverse engineering and threat intelligence.

Toulouse
10 & 11 April 2025
30m
DVID
The security of connected devices starts here
DVID © 2026. All rights reserved
Never miss an update
Don't miss any news about DVID: trainings, updates, events… Subscribe to our newsletter and stay in the loop.