21.gif

Search (advanced search)
Use this Search form before posting, asking or make a new thread.
Tips: Use Quotation mark to search words (eg. "How To Make Money Online")

11-17-2019, 11:35 PM
Post: #1
SDR EXPLOITATION
hello , guys i hope ure doing good , i really need this course As soon as possible , if anyone can help i really appreciate it , or if anyone is interested let's make a groupe buy
Training link sales page
Fees: 70 USD (Discount Price)
Duration: More Than 70 Hours

Description
Welcome to SDR Exploitation (Hands-On Penetration testing up in the air ). Software-defined radio (SDR) is rapidly becoming a well-known term, even outside the Information Security industry. From the ability to set off emergency alert systems to emulating car keyfobs and everything in between, SDR is opening a whole new set of doors for penetration testing and security research. In order to detect potential vulnerabilities in RF, penetration testing should be conducted. Penetration testing tests the "air" on the exterior and interior of a facility, analyzing the various frequencies being used by RF equipment. It involves determining where each frequency is coming from, and then assessing whether it is vulnerable to hackers. the course will cover Complete four domain .

1. Automotive pentest (Vehicle Pentest)
2. Cellular Network Pentest
3. Penetartion Testing IoT Devices
4. Wireless / RF Security Penetartion Testing

Who this course is for:
1. Anyone wants to learn SDR
2. Anyone wants to learn SDR Hacking
3. Anyone wants to learn Car Pentesting Concept
4. Anyone interested to learn IOT Device Penetration
5. Anyone interested in Securing Radio Frequency networks



Section 1: Getting familiar with SDR 90:00
Section 2: Exploring SDR 90:00
Section 3: Introduction and World Of SDR Hacking 90:00
Section 4: Hands-On With SDR 90:00
NOTE:Below Onwards There are Attacks Only,We may Add Subsections in Below Attacks 60:00 (Minutes Each)
Section 5: Sample SDR Replay Attack
Section 6: Signal Demodulation Replay Attack
Section 7: Attacking Rolling Code
Section 8: Disabling Component Functionalities
Section 9: RF Jamming Attack
Section 10: Rogue Evil BTS Setup
Section 11: Evil LTE Network
Section 12: BTS Spoofing Attcak
Section 13: GSM/GPRS Traffic Interception
Section 14: GSM Sniffing
Section 15: User Location Manipulation On GSM Network
Section 16: Roaming Information Manipulation
Section 17: Side Channel Attack
Section 18: MITM Attack On Cellular Network
Section 19: GSM SMS Sniffing
Section 20: Message Tampering
Section 21: DOS Attack
Section 22: Silent SMS Attack
Section 23: Spam SMS Attack
Section 24: IMSI Catchers Live
Section 25: Redirection Attack in GSM
Section 26: Configuring Key Fobs For Gates And Doors
Section 27: Monitoring Car Components
Section 28: Car Components For vehicle Pentest
Section 29: Wirelss System And SDR In Car
Section 30: Hacking With TPMS
Section 31: Attacking Key And Immobilizers
Section 32: Cheat GirlFriend\BoyFriend For Location Sharing On WhatsApp Fake GPS Spoofing Attack
Section 33: PII Leakage [Bugcrowd]
Section 34: KeyFob Cloning [Bugcrowd]
Section 35: Code Execution (CaN Bus Pivot) [Bugcrowd]
Section 36: CAN Injection/Interaction [Bugcrowd]
Section 37: Code Execution (No Can Bus Pivot) [Bugcrowd]
Section 38: Unauthorized Access To Services (Api/Endp) [Bugcrowd]
Section 39: Data Leakage/Pull Encryption Mechanism [Bugcrowd]
Section 40: Source Code Dump [Bugcrowd]
Section 41: DOS On Automotive Security [Bugcrowd]
Section 42: Default Credentials [Bugcrowd]
Section 43: Unauthorized Access/Turn-on for RFHuB [Bugcrowd]
Section 44: CAN Injection (Disallowed Massages) [Bugcrowd]
Section 45: CAN Injection (DOS) [Bugcrowd]
Section 46: Roll Jam for RFHuB [Bugcrowd]
Section 47: Replay for RFHuB [Bugcrowd]
Section 48: Relay for RFHuB [Bugcrowd]
Section 49: Receiving, Customizing, Transmitting and Retransmitting FM Radio Signals
Section 50: live Broadcasting FM Radio Signals
Section 51: Hacking Fine Alarm System in a Shopping Mall (With Permissions)
Section 52: playing with IoT Sensor while opening/closing a shopping Mall gate
Section 53: Hacking Traffic Light Simulation
Section 54: RFID/ NFC hacking low Frequency as wll as High Frequency
Section 55: Hacking wireless Security Systems
Section 56: Hacking Wireless Gadgets
Section 57: Hacking CAR With The Help Of JAM-Listen-Replay Methodology
Section 58: Drone Hacking
Section 59: CAR Pentesting Overview And Background Concept
Section 60: Attacking ECUS And Other Embedded System
Section 61: In Vehicle Infotainment System Hacking
Section 62: SS7 Hack Attack
Section 63: Any Social Network Account Hacking With SS7 Hack Attack
Section 64: Penetration Testing For Zigbee Devices
Section 65: BLF Pentesting
Section 66: Any RF Controlled Device Hacking




33.gif