4-Day Training Course: Blue Oceans - Advanced Attacks Against BLE, NFC, HCE and More (Abu Dhabi, United Arab Emirates - October 13-16, 2019) - ResearchAndMarkets.com
DUBLIN--(BUSINESS WIRE)--Sep 12, 2019--
The “Blue Oceans: Advanced Attacks Against BLE, NFC, HCE and more” training has been added to ResearchAndMarkets.com’s offering.
Bluetooth Low Energy is one of the most exploding IoT technologies. BLE devices surround us more and more - not only as wearables, toothbrushes, and sex toys, but also smart locks, medical devices, and banking tokens. Alarming vulnerabilities of these devices have been exposed multiple times recently. And yet, the knowledge on how to comprehensively assess their security seems very uncommon. Not to mention best practices guidelines, which are practically absent.
This is probably the most exhaustive and up to date training regarding BLE security - for both pen-testers and developers. Compressing years of painful debugging and reversing into practical, useful checklists. Based on hands-on exercises on real devices (including multiple smart locks) as well as a deliberately vulnerable, training hackmelock.
RFID/NFC, on the other hand, has been around us for quite long. However, the vulnerabilities pointed out years ago, probably won’t be resolved in the near future. It is still surprisingly easy to clone most access control cards used for buildings today. Among other practical exercises performed on real installations, the attendees will reverse-engineer an example hotel access system, and as a result, will be able to open all the doors in the facility. A list of several hundred hotels affected included.
With the prevalence of NFC smartphones, a new implementation of this technology is recently gaining attention: mobile contactless payments/access control, on Android known as Host Card Emulation. Using a combination of cloud services and mobile security, it is now possible to embed credit card (or NFC key to a lock) in your phone. Is technology as robust as advertised? How to check its security, and how to implement it correctly? Find out during practical exercises, including step by step guide on how to bypass security mechanisms and clone a contactless payment card.
Software Defined Radio - a concept of processing signals in software instead of hardware - brings almost unlimited possibilities for analysing various wireless protocols. Yet skills in this area still seem to be rather uncommon. This training aims to fill this competency gap using a very practical approach and inexpensive hardware.
Each attendee will receive worth over 350 USD hardware pack including among others Proxmark 3, a rooted Android smartphone and Raspberry Pi (detailed below). The hardware will allow for BLE analysis (sniffing, intercepting), cloning and cracking multiple kinds of proximity cards, analyse BLE or NFC mobile applications, and more importantly, practice the majority of the training exercises later at home.
Key Learning Objectives
Each student will receive:
For more information about this training visit https://www.researchandmarkets.com/r/gm6ou4
View source version on businesswire.com:https://www.businesswire.com/news/home/20190912005578/en/
Laura Wood, Senior Press Manager
For E.S.T Office Hours Call 1-917-300-0470
For U.S./CAN Toll Free Call 1-800-526-8630
For GMT Office Hours Call +353-1-416-8900
INDUSTRY KEYWORD: SECURITY CONSUMER ELECTRONICS TECHNOLOGY MOBILE/WIRELESS
SOURCE: Research and Markets
Copyright Business Wire 2019.
PUB: 09/12/2019 09:40 AM/DISC: 09/12/2019 09:40 AM