€3,299.00
Date | Day | Time | Duration |
17 Apr | Monday | 0900-17:00 CEST/GMT+2 | 8 Hours |
18 Apr | Tuesday | 0900-17:00 CEST/GMT+2 | 8 Hours |
19 Apr | Wednesday | 0900-17:00 CEST/GMT+2 | 8 Hours |
Compared to other courses that teach how to use public tools, this class is more about understanding how these tools work and building proper tools to analyze and attack targeted systems. All techniques here will demonstrate real uses-cases encountered in pentests and Red Teams, but also techniques that aim to be applied to future systems by teaching essential steps when dealing with unknown targets.
The first day will be a mixture of 50% theory and 50% practice, to do a few radio reminders and see essential concepts for our exercises.
Starting on day 2, students will have to develop tools using GNU Radio for different scenarios. These different exercises will make them confident in developing the framework and show how to create even tools that do not exist on exotic systems to perform reverse engineering on different types of signals but also to interact by generating and sending their signal.
Sébastien Dudek is a security researcher at Trend Micro and is also the founder of the PentHertz consulting company which specializes in wireless and hardware security.
He has been particularly passionate about flaws in radio-communication systems, and published researches on mobile security (baseband fuzzing, interception, mapping, etc.), and on data transmission systems using the power-line (Power-Line Communication, HomePlug AV) like domestic PLC plugs, as well as electric cars and charging stations. He also focuses on practical attacks with various technologies such as Wi-Fi, RFID, and other systems that involve wireless communications.