The board core is composed of an Atmega328p and an OLED screen. For each vulnerability, a firmware has to be flashed on the Atmega328p in order to offer a specific vulnerable environment.
There are also connection ports like UART, Bluetooth, 2,4Ghz and Wifi. In each vulnerability, a specific extension board must be plugged to the board.
Hacking requires attacks tools like USBasp (for flashing) and USBuart (for serial interactions)