Madelifeeasy, a large medical IoT device company, has manufactured an implantable cardiac device called an implantable cardioverter-defibrillator (ICD). The ICD is a small battery-operated IoT device implanted in the chest to detect and stop irregular heartbeats. It continuously monitors the wearer's heartbeat and delivers electric shocks when needed to restore a regular heart rhythm. This device constantly transmits, processes, and collects data in the cloud without encryption. Recently, an attacker managed to gain access to the device through an existing vulnerability and was able to control the device's functioning. The attacker could have easily manipulated information and transmitted false signals, such as depleting the battery or administering incorrect pacing or shocks. This could have caused a life-threatening incident for patients who have the ICD implanted. Fortunately, no patients were harmed. Once the vulnerability was discovered, the organization immediately released a software patch to fix the problem in the device's transmitter. Provide some instructions on how to recreate this as a ctf challenge Include the methodolgies to setup the infrastructure 3 / 3