Hacking and Forensics on the Go
Offered By: 44CON Information Security Conference via YouTube
Course Description
Overview
Explore hacking and forensics techniques for mobile devices in this 49-minute conference talk by Phil Polstra at 44CON 2012. Learn about choosing the right platform, with a focus on Beagleboard, and discover methods for building a base device and cross-compilation. Delve into creating hardware accessories, WiFi and password cracking, and exploiting Windows 7 vulnerabilities. Gain insights on Udev rules and scripts, and get a glimpse of future directions in mobile hacking and forensics.
Syllabus
Hacking and Forensics on the Go
What is this talk about?
Why You Should Care
Roadmap
Choosing a Platform
And the winning Platform is...
Beagleboard
Selecting a Base OS
Building a Base Device
Native Compilation
Cross-Compile Method 1
Create a Project from the Makefile
Create a Build Configuration
Cross-Compile Method 3 (contd.) • Create /etc/hosts entry for BB-XM IP - On BB-XM install SSH & GDBServer
Create a Connection
Create Debug Configuration
Building Your Own Hardware Accessories
Chris John Riley
Demo 1 (contd.)
Wifi Cracking
Password Cracking
WPS Cracking
Pwn Win7 Like Its a
Clickiddies
Enter Udev Rules
Udev Rules Scripts (contd.)
Future Directions
Taught by
44CON Information Security Conference
Related Courses
Supply Chain Unchained - How To Be A Bad SaaS44CON Information Security Conference via YouTube Aviation Security 101
44CON Information Security Conference via YouTube The Anti-Checklist Manifesto
44CON Information Security Conference via YouTube Why Are We Still Doing Authentication Wrong?
44CON Information Security Conference via YouTube What Do Hackers See When They Look at the Clouds
44CON Information Security Conference via YouTube