DURATION: 2 DAYS
CAPACITY: 20 pax
SEATS AVAILABLE: ONLINE REGISTRATION IS CLOSED
PRICE: EUR1499 (early bird)
EUR1999 (normal)
Early bird registration rate ends on the 14th of February
Overview
One of the key attributes of the Internet of Things (IoT) is that it makes heavy use of wireless communications to allow for mobility and easy-of-installation. It is important to note this is not just Wi-Fi, but all manner of other Radio Frequency (RF) protocols: Bluetooth, BTLE, ZigBee, Z-Wave – to name just a few. The increasing ubiquity of such devices and networks promises to make life easier (smart fridges, …), however manufactures often overlook the security in the implementation of this RF communication systems.
This course will teach you the fundamentals of how to use Software Defined Radio (SDR) to analyse, demodulate and decode RF signals used in the wireless IoT, and then how you can perform your own research and penetration testing to test whether a system is secure, or vulnerable to attack.
There will be a combination of theory (explaining RF and Digital Signal Processing concepts), and also hands-on practical components with SDRs. We will use open source software (Python and GNU Radio) to analyse existing signals, and also to allow you to create your own!
Who Should Attend
Anyone that has an interest in getting a taste of reverse engineering systems that employ RF communications, and analysing the security aspects of the underlying wireless protocols.
Key Learning Objectives
Prerequisite Knowledge
Attendees must have basic knowledge in Linux and Python.
Hardware / Software Requirements
Attendees should have a modern Laptop that supports booting from a USB drive with at least two free USB ports. One port will be required to boot a Live USB flash drive we will supply, and the other will be used to connect to a SDR that we will lend to participants (preferably a USB 3 port).
Agenda
Day 1: SDR/Wireless Intro
Day 2: Hacking!