Hacking and Forensics on the Go
Offered By: 44CON Information Security Conference via YouTube
Course Description
Overview
Explore hacking and forensics techniques for mobile devices in this 49-minute conference talk by Phil Polstra at 44CON 2012. Learn about choosing the right platform, with a focus on Beagleboard, and discover methods for building a base device and cross-compilation. Delve into creating hardware accessories, WiFi and password cracking, and exploiting Windows 7 vulnerabilities. Gain insights on Udev rules and scripts, and get a glimpse of future directions in mobile hacking and forensics.
Syllabus
Hacking and Forensics on the Go
What is this talk about?
Why You Should Care
Roadmap
Choosing a Platform
And the winning Platform is...
Beagleboard
Selecting a Base OS
Building a Base Device
Native Compilation
Cross-Compile Method 1
Create a Project from the Makefile
Create a Build Configuration
Cross-Compile Method 3 (contd.) • Create /etc/hosts entry for BB-XM IP - On BB-XM install SSH & GDBServer
Create a Connection
Create Debug Configuration
Building Your Own Hardware Accessories
Chris John Riley
Demo 1 (contd.)
Wifi Cracking
Password Cracking
WPS Cracking
Pwn Win7 Like Its a
Clickiddies
Enter Udev Rules
Udev Rules Scripts (contd.)
Future Directions
Taught by
44CON Information Security Conference
Related Courses
RISC-V Toolchain and Compiler Optimization TechniquesLinux Foundation via edX Pushing Security Left by Mutating Byte Code
nullcon via YouTube Using Conan in a Real-World Complex Project
NDC Conferences via YouTube Docker + WebAssembly Meetup
Docker via YouTube Strategies for Developing and Deploying Your Embedded Applications and Images
Linux Foundation via YouTube