Hacking and Forensics on the Go
Offered By: 44CON Information Security Conference via YouTube
Course Description
Overview
Explore hacking and forensics techniques for mobile devices in this 49-minute conference talk by Phil Polstra at 44CON 2012. Learn about choosing the right platform, with a focus on Beagleboard, and discover methods for building a base device and cross-compilation. Delve into creating hardware accessories, WiFi and password cracking, and exploiting Windows 7 vulnerabilities. Gain insights on Udev rules and scripts, and get a glimpse of future directions in mobile hacking and forensics.
Syllabus
Hacking and Forensics on the Go
What is this talk about?
Why You Should Care
Roadmap
Choosing a Platform
And the winning Platform is...
Beagleboard
Selecting a Base OS
Building a Base Device
Native Compilation
Cross-Compile Method 1
Create a Project from the Makefile
Create a Build Configuration
Cross-Compile Method 3 (contd.) • Create /etc/hosts entry for BB-XM IP - On BB-XM install SSH & GDBServer
Create a Connection
Create Debug Configuration
Building Your Own Hardware Accessories
Chris John Riley
Demo 1 (contd.)
Wifi Cracking
Password Cracking
WPS Cracking
Pwn Win7 Like Its a
Clickiddies
Enter Udev Rules
Udev Rules Scripts (contd.)
Future Directions
Taught by
44CON Information Security Conference
Related Courses
Becoming Familiar with SUSE Linux EnterpriseA Cloud Guru Akamai Customer Consulting and Support
Coursera Akamai Network Engineering
Coursera Operating Systems Fundamentals
Akamai via Coursera Asegurar los recursos de VPC con grupos de seguridad (Español LATAM) | Securing VPC Resources with Security Groups (LATAM Spanish)
Amazon Web Services via AWS Skill Builder