Click to copy
Press release content from Business Wire. The AP news staff was not involved in its creation.
Click to copy
PRESS RELEASE: Paid content from Business Wire
Press release content from Business Wire. The AP news staff was not involved in its creation.

4-Day Training Course: Blue Oceans - Advanced Attacks Against BLE, NFC, HCE and More (Abu Dhabi, United Arab Emirates - October 13-16, 2019) - ResearchAndMarkets.com

September 12, 2019

DUBLIN--(BUSINESS WIRE)--Sep 12, 2019--

The “Blue Oceans: Advanced Attacks Against BLE, NFC, HCE and more” training has been added to ResearchAndMarkets.com’s offering.

Bluetooth Low Energy is one of the most exploding IoT technologies. BLE devices surround us more and more - not only as wearables, toothbrushes, and sex toys, but also smart locks, medical devices, and banking tokens. Alarming vulnerabilities of these devices have been exposed multiple times recently. And yet, the knowledge on how to comprehensively assess their security seems very uncommon. Not to mention best practices guidelines, which are practically absent.

This is probably the most exhaustive and up to date training regarding BLE security - for both pen-testers and developers. Compressing years of painful debugging and reversing into practical, useful checklists. Based on hands-on exercises on real devices (including multiple smart locks) as well as a deliberately vulnerable, training hackmelock.

RFID/NFC, on the other hand, has been around us for quite long. However, the vulnerabilities pointed out years ago, probably won’t be resolved in the near future. It is still surprisingly easy to clone most access control cards used for buildings today. Among other practical exercises performed on real installations, the attendees will reverse-engineer an example hotel access system, and as a result, will be able to open all the doors in the facility. A list of several hundred hotels affected included.

With the prevalence of NFC smartphones, a new implementation of this technology is recently gaining attention: mobile contactless payments/access control, on Android known as Host Card Emulation. Using a combination of cloud services and mobile security, it is now possible to embed credit card (or NFC key to a lock) in your phone. Is technology as robust as advertised? How to check its security, and how to implement it correctly? Find out during practical exercises, including step by step guide on how to bypass security mechanisms and clone a contactless payment card.

Software Defined Radio - a concept of processing signals in software instead of hardware - brings almost unlimited possibilities for analysing various wireless protocols. Yet skills in this area still seem to be rather uncommon. This training aims to fill this competency gap using a very practical approach and inexpensive hardware.

Each attendee will receive worth over 350 USD hardware pack including among others Proxmark 3, a rooted Android smartphone and Raspberry Pi (detailed below). The hardware will allow for BLE analysis (sniffing, intercepting), cloning and cracking multiple kinds of proximity cards, analyse BLE or NFC mobile applications, and more importantly, practice the majority of the training exercises later at home.

Key Learning Objectives

Prerequisite Knowledge

Hardware/Software Requirements

Each student will receive:

For more information about this training visit https://www.researchandmarkets.com/r/gm6ou4

View source version on businesswire.com:https://www.businesswire.com/news/home/20190912005578/en/

CONTACT: ResearchAndMarkets.com

Laura Wood, Senior Press Manager


For E.S.T Office Hours Call 1-917-300-0470

For U.S./CAN Toll Free Call 1-800-526-8630

For GMT Office Hours Call +353-1-416-8900



SOURCE: Research and Markets

Copyright Business Wire 2019.

PUB: 09/12/2019 09:40 AM/DISC: 09/12/2019 09:40 AM


All contents © copyright 2019 The Associated Press. All rights reserved.