Madelifeeasy, a large medical IoT device company,
has manufactured an implantable cardiac device
called an implantable cardioverter-defibrillator (ICD).
The ICD is a small battery-operated IoT device
implanted in the chest to detect and stop irregular
heartbeats. It continuously monitors the wearer's
heartbeat and delivers electric shocks when needed
to restore a regular heart rhythm. This device
constantly transmits, processes, and collects data in
the cloud without encryption. Recently, an attacker
managed to gain access to the device through an
existing vulnerability and was able to control the
device's functioning. The attacker could have easily
manipulated information and transmitted false
signals, such as depleting the battery or administering
incorrect pacing or shocks. This could have caused a
life-threatening incident for patients who have the ICD
implanted. Fortunately, no patients were harmed.
Once the vulnerability was discovered, the
organization immediately released a software patch
to fix the problem in the device's transmitter.  
Provide some instructions on how to recreate this as a ctf challenge
Include the methodolgies to setup the infrastructure

3 / 3