$3,299.00
Date | Day | Time | Duration |
22 Aug | Monday | 09:00-17:00 SGT/GMT +8 | 8 Hours |
23 Aug | Tuesday | 09:00-17:00 SGT/GMT +8 | 8 Hours |
24 Aug | Wednesday | 09:00-17:00 SGT/GMT +8 | 8 Hours |
In order to detect potential vulnerabilities in RF, penetration testing should be conducted. Penetration testing tests the “air” on the exterior and interior of a facility, analysing the various frequencies being used by RF equipment. It involves determining where each frequency is coming from, and then assessing whether it is vulnerable to hackers.
Introduction toolkits to develop Software-Defined Radio tools like GNU Radio and other alternatives such as Pothos, Redhawk SDR, or MATLAB and Simulink.
During this day we will mainly focus on GNU Radio by introducing the toolkit, the flowgraph concepts, the components, and how to use the different blocks in practice to build several tools
Objective:
Theory
Assignments 1
Assignment 2
Assignment 3
Assignment 4
Starting day 2, attendees will have the opportunity to see and exploit vulnerabilities in several RF devices and discover the security features and ways to circumvent them.We will see in practice how to attack physical intrusions systems such as alarms, intercoms and access control systems that use RF technologies such as sub-GHz, cellular, and RFID. Attendees will have the opportunity to learn techniques that could be used in Red Team contexts and get our feedback from our previous tests.
Theory
Assignment 1
Assignment 2
Assignment 3
Assignment 4
Focusing on attacking custom RF devices but also devices used in industrial systems using technologies such as the LoRa, Power-Line Communications, ZigBee, and how to manage to do testbeds many current technologies. We will also introduce devices that could act like unexpected implants and ways to analyse them. Then we will finish with an introduction to hardware hacking that could be complementary to RF hacking by talking about survival and practical reflexes, as well as methods to interface with hardware.
Theory:
Assignment 1
Assignment 2
Assignment 3
Assignment 4:
Assignment 5:
Mr. Gal Diskin is a cybersecurity and AI researcher. He was previously the VP & head of Palo Alto Networks’ Israeli site, and is a serial entrepreneur. Mr. Diskin’s research has been featured in HITB, Defcon, Black Hat, CCC, and other conferences, spanning fields from low level security research such as hardware vulnerabilities, binary instrumentation, and car hacking to high level research on AI detection methods, Enterprise security, and Identity security. Mr. Diskin was also the technical lead and co-founder of Intel’s software security organization, as well as the CTO of Cyvera and HeXponent (co-founder) before their acquisition.
Huajiang โKevin2600โ Chen (Twitter: @kevin2600) is a senior security researcher. He mainly focuses on vulnerability research in wireless and Vehicle security. He is a winner of GeekPwn 2020 and also made to the Tesla hall of fame 2021. Kevin2600 has spoken at various conferences including KCON; DEFCON and CANSECWEST.
intercontinental singapore
follow us