Please note: the training ticket does not include access to the conference. Similarly, the conference ticket does not grant access to the trainings. If you have any questions, reach out to us.
Students will learn about Software-Defined Radio applied against common physical intrusion systems (alarms, intercoms, various remotes, etc.), and IoT devices. This course provides basics, survival reflexes when testing real-world radio devices, and methods to go further. Compared to other courses that teach how to use public tools, this class is more about understanding how these tools work and also how to build proper tools to analyze and attack targeted systems. In the end, we will also see how to go further with an introduction to RF signal analysis instrumentation with help of Machine Learning and Deep Learning, and how to deal with radio emanations and EM side-channel attacks.
In this 3-day training, students will learn about Software-Defined Radio applied against common physical intrusion system (alarms, intercoms, various remotes, etc.), and IoT devices. This course provides basics, survival reflexes when testing real-world radio devices, and methods to go further. Comparing to other courses that teach how to use public tools, this class is more about understanding how these tools work and also how to build proper tools to analyze and attack targeted systems. At the end, we will also see how to go further with an introduction to RF signal analysis intrumentation with help of Machine Learning and Deep Learning, and how to deal witch radio emmanations and EM side-channel attacks.
This course is intended for any:
Day 1 is an introduction to radio that will help students to learn its concepts and the techniques used today to receive and transmit signals, but also the constraints that we have to deal with in heterogeneous environments:
These days will allow doing important remindings in the radio concepts, but will also include new ones specific to Software-Defined Radio and security.
Day 2 will put the student in the playground of Software-Defined Radio, where every idea can be written to be simulated and then concretized to realize receivers and transmitters depending on the chosen hardware limitations:
During this day, there will be more than 90% practice doing little projects to play with the GNU Radio framework until we dive into bigger projects.
Days 3 resumes and applies previous chapters to study common IoT communications and brings useful tricks for Red Team tests as well as pentests. In addition, we will also see how we can go further by instrumenting analysis thanks to ML/DL and talk about radio emanations and EM side-channel attacks:
And if we have time, or you want to discuss further during coffee break or the conference :
Hands-on radio captures, interacting with real signals, creating custom tools for specific communications, identifying technologies, reversing even exotic communications, and interacting with them.
Sébastien Dudek is a security researcher at Trend Micro and is also the founder of the PentHertz consulting company specialized in wireless and hardware security. He has been particularly passionate about flaws in radio-communication systems, and published researches on mobile security (baseband fuzzing, interception, mapping, etc.), and on data transmission using the power-line (Power-Line Communication, HomePlug AV) like domestic PLC plugs, as well as electric cars and charging stations. He also focuses on practical attacks with various technologies such as Wi-Fi, RFID, and other systems that involve wireless communications.