HITBSECCONF2010 - DUBAI IS OVER!
THANK YOU TO ALL THE SPEAKERS AND ATTENDEES WHO MADE IT OVER TO JOIN US!

CONFERENCE MATERIALS
CONFEENCE PHOTOS

TT4 – Bluetooth & Wireless Security

Trainer: Dino Covotsos (Managing Director, Telspace)
Capacity: 15 pax
Seats left: 9
Duration: 2 days
Cost: (per pax) USD1499 (early bird) / USD1899 (non early-bird)

REGISTER NOW

Overview

Wireless networks are continually growing in our modern world and society. This 2 day course aims to demystify wireless network security and inform attendees on how to improve wireless LAN security and Bluetooth security. This will be achieved via theory and practical. Attendees will first obtain detailed theoretical analysis of different wireless security schemas (i.e. Theory), thereafter have hands on experience in how the attacks are performed (i.e. Practical).

Course Agenda
Day 1 – Wireless

Introduction to Wireless Hacking

Wireless and its technology usage
Wireless networking breakdown
Security of wireless and progression
What is wardriving?
Attacking wireless brief

Wireless Protocols and Architecture

Analysis of various wireless protocols
Wireless architecture and design
802.11 Protocol Analysis

Network Mapping and Methodology for securing wireless networks

Discovery of wireless networks

Antenna variations
Monitoring the wireless network, including packet analysis
Various toolsets including Netstumbler, Kismet, the Aero suites and so fourth

Wireless hacking tools and attacks

Traffic injection tools
Spoofing
Flooding
Aircrack and Aero suite of tools
Airsnort
WEP hacking cracking
WPA, WPA2 hacking techniques
Frame generation

Defending against wireless hacking

Site layout and planning
Improving your wireless systems against hacker attacks
Filtering

Day 2 – Bluetooth
Introduction to Bluetooth

What is Bluetooth?
What does it allow for?
How Bluetooth works
Bluetooth data rates
Bluetooth ranges and specifications
Introduction Bluetooth security (Scatternets)
Latest developments with Bluetooth

Bluetooth vulnerabilities overview

The Snarfing attack
The Bluebug attack
The backdoor attack
Bluechop
Bluedump
Bluebump
Bluesmack
The social engineering factor
Bluetooth viruses
Bluetooth implementation problems

Bluetooth hacking tools and techniques

BTscan , Bluestumbler , Bluescan , BT Browser
Bluesnarf
Bluebug
Bloover II
Carwhisperer
Blueprinting (SDP tool)
Brute force discovery – Redfang
Optimising range of Bluetooth attacks

Defending against Bluetooth attacks

Bluetooth recommendations
Standard organizations practice
The future for Bluetooth security and implementations


Dino Covotsos

Dino Covotsos is the Founder and Managing Director of Telspace Systems, a South African IT security firm which started business in 2002. Mr. Covotsos has many years of experience in the IT security industry and has been involved in many different large scale projects worldwide, ranging from vulnerability assessment to attack and penetration testing for corporate clients. Mr.Covotsos uses his hands on knowledge to help secure corporate networks in new and unique ways and has also written articles for various magazines in the IT and Government sector specifically on information security issues.