Note: To ensure that all training kits are delivered to the attendees before the start of the trainings, we encourage everyone to register for RF Hacking with Software-Defined Radio before Friday, 11 September 2020. After this day, we cannot ensure that all kits are delivered in time.
In this 3-day training, students will learn about Software-Defined Radio applied against physical intrusion system (alarms, intercoms, various remotes, etc.). This course provides basics, survival reflexes when testing real-world radio devices, and methods to go further. Comparing to other courses that teach how to use public tools, this class is more about understanding how these tools work and also how to build proper tools to analyze and attack targeted systems.
This course is intended for any:
Day 1 is an introduction to radio that will help students to learn it's concepts and the techniques used today to receive and transmit signal, but also the constraints that we have to deal with in heterogeneous environments:
Day 2 will put the student in the playground of Software-Defined Radio, where every idea can be written to be simulated and then concretized to realize receivers and transmitters depending on the chosen hardware limitations:
Days 3 and 4 resume and applie previous chapters to study physical intrusion systems and brings useful tricks for Red Team tests as well as pentests:
The training will provide strong feedback and techniques when attacking radio devices in non-perfect environment and ways to succeed your pentests or red team tests. Student will also get hardware to play at home including a SDR to transmit and receive signal and RF transmitter that could be customized and continue to practice after the training.
In addition to the course, students will receive a Tx/Rx full-duplex device, that could be tuned to 70 MHz to 6000 MHz with 20 MHz bandwidth, to continue to play at home
Sébastien Dudek is a security researcher at Trend Micro and founder of the PentHertz company specialized in radiocommunication and hardware security. He has been particularly passionate about flaws in radio-communication systems, and published researches on mobile security (baseband fuzzing, interception, mapping, etc.), and on data transmission systems using the power-line (Power-Line Communication, HomePlug AV) like domestic PLC plugs, as well as electric cars and charging stations. He also focuses on practical attacks with various technologies such as Wi-Fi, RFID, and other systems that involve wireless communications.