Search (advanced search) | ||||
Use this Search form before posting, asking or make a new thread.
|
11-17-2019, 11:35 PM
Post: #1
|
|||
|
|||
SDR EXPLOITATION
hello , guys i hope ure doing good , i really need this course As soon as possible , if anyone can help i really appreciate it , or if anyone is interested let's make a groupe buy
Training link sales page Fees: 70 USD (Discount Price) Duration: More Than 70 Hours Description Welcome to SDR Exploitation (Hands-On Penetration testing up in the air ). Software-defined radio (SDR) is rapidly becoming a well-known term, even outside the Information Security industry. From the ability to set off emergency alert systems to emulating car keyfobs and everything in between, SDR is opening a whole new set of doors for penetration testing and security research. In order to detect potential vulnerabilities in RF, penetration testing should be conducted. Penetration testing tests the "air" on the exterior and interior of a facility, analyzing the various frequencies being used by RF equipment. It involves determining where each frequency is coming from, and then assessing whether it is vulnerable to hackers. the course will cover Complete four domain . 1. Automotive pentest (Vehicle Pentest) 2. Cellular Network Pentest 3. Penetartion Testing IoT Devices 4. Wireless / RF Security Penetartion Testing Who this course is for: 1. Anyone wants to learn SDR 2. Anyone wants to learn SDR Hacking 3. Anyone wants to learn Car Pentesting Concept 4. Anyone interested to learn IOT Device Penetration 5. Anyone interested in Securing Radio Frequency networks Section 1: Getting familiar with SDR 90:00 Section 2: Exploring SDR 90:00 Section 3: Introduction and World Of SDR Hacking 90:00 Section 4: Hands-On With SDR 90:00 NOTE:Below Onwards There are Attacks Only,We may Add Subsections in Below Attacks 60:00 (Minutes Each) Section 5: Sample SDR Replay Attack Section 6: Signal Demodulation Replay Attack Section 7: Attacking Rolling Code Section 8: Disabling Component Functionalities Section 9: RF Jamming Attack Section 10: Rogue Evil BTS Setup Section 11: Evil LTE Network Section 12: BTS Spoofing Attcak Section 13: GSM/GPRS Traffic Interception Section 14: GSM Sniffing Section 15: User Location Manipulation On GSM Network Section 16: Roaming Information Manipulation Section 17: Side Channel Attack Section 18: MITM Attack On Cellular Network Section 19: GSM SMS Sniffing Section 20: Message Tampering Section 21: DOS Attack Section 22: Silent SMS Attack Section 23: Spam SMS Attack Section 24: IMSI Catchers Live Section 25: Redirection Attack in GSM Section 26: Configuring Key Fobs For Gates And Doors Section 27: Monitoring Car Components Section 28: Car Components For vehicle Pentest Section 29: Wirelss System And SDR In Car Section 30: Hacking With TPMS Section 31: Attacking Key And Immobilizers Section 32: Cheat GirlFriend\BoyFriend For Location Sharing On WhatsApp Fake GPS Spoofing Attack Section 33: PII Leakage [Bugcrowd] Section 34: KeyFob Cloning [Bugcrowd] Section 35: Code Execution (CaN Bus Pivot) [Bugcrowd] Section 36: CAN Injection/Interaction [Bugcrowd] Section 37: Code Execution (No Can Bus Pivot) [Bugcrowd] Section 38: Unauthorized Access To Services (Api/Endp) [Bugcrowd] Section 39: Data Leakage/Pull Encryption Mechanism [Bugcrowd] Section 40: Source Code Dump [Bugcrowd] Section 41: DOS On Automotive Security [Bugcrowd] Section 42: Default Credentials [Bugcrowd] Section 43: Unauthorized Access/Turn-on for RFHuB [Bugcrowd] Section 44: CAN Injection (Disallowed Massages) [Bugcrowd] Section 45: CAN Injection (DOS) [Bugcrowd] Section 46: Roll Jam for RFHuB [Bugcrowd] Section 47: Replay for RFHuB [Bugcrowd] Section 48: Relay for RFHuB [Bugcrowd] Section 49: Receiving, Customizing, Transmitting and Retransmitting FM Radio Signals Section 50: live Broadcasting FM Radio Signals Section 51: Hacking Fine Alarm System in a Shopping Mall (With Permissions) Section 52: playing with IoT Sensor while opening/closing a shopping Mall gate Section 53: Hacking Traffic Light Simulation Section 54: RFID/ NFC hacking low Frequency as wll as High Frequency Section 55: Hacking wireless Security Systems Section 56: Hacking Wireless Gadgets Section 57: Hacking CAR With The Help Of JAM-Listen-Replay Methodology Section 58: Drone Hacking Section 59: CAR Pentesting Overview And Background Concept Section 60: Attacking ECUS And Other Embedded System Section 61: In Vehicle Infotainment System Hacking Section 62: SS7 Hack Attack Section 63: Any Social Network Account Hacking With SS7 Hack Attack Section 64: Penetration Testing For Zigbee Devices Section 65: BLF Pentesting Section 66: Any RF Controlled Device Hacking |
|||