YoVDO

Hacking and Forensics on the Go

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Cybersecurity Courses Ethical Hacking Courses Digital Forensics Courses Operating Systems Courses Makefiles Courses Cross-Compilation Courses Hardware Hacking Courses

Course Description

Overview

Explore hacking and forensics techniques for mobile devices in this 49-minute conference talk by Phil Polstra at 44CON 2012. Learn about choosing the right platform, with a focus on Beagleboard, and discover methods for building a base device and cross-compilation. Delve into creating hardware accessories, WiFi and password cracking, and exploiting Windows 7 vulnerabilities. Gain insights on Udev rules and scripts, and get a glimpse of future directions in mobile hacking and forensics.

Syllabus

Hacking and Forensics on the Go
What is this talk about?
Why You Should Care
Roadmap
Choosing a Platform
And the winning Platform is...
Beagleboard
Selecting a Base OS
Building a Base Device
Native Compilation
Cross-Compile Method 1
Create a Project from the Makefile
Create a Build Configuration
Cross-Compile Method 3 (contd.) • Create /etc/hosts entry for BB-XM IP - On BB-XM install SSH & GDBServer
Create a Connection
Create Debug Configuration
Building Your Own Hardware Accessories
Chris John Riley
Demo 1 (contd.)
Wifi Cracking
Password Cracking
WPS Cracking
Pwn Win7 Like Its a
Clickiddies
Enter Udev Rules
Udev Rules Scripts (contd.)
Future Directions


Taught by

44CON Information Security Conference

Related Courses

Becoming Familiar with SUSE Linux Enterprise
A Cloud Guru
Akamai Customer Consulting and Support
Coursera
Akamai Network Engineering
Coursera
Operating Systems Fundamentals
Akamai via Coursera
Asegurar los recursos de VPC con grupos de seguridad (Español LATAM) | Securing VPC Resources with Security Groups (LATAM Spanish)
Amazon Web Services via AWS Skill Builder