YoVDO

Hacking and Forensics on the Go

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Cybersecurity Courses Ethical Hacking Courses Digital Forensics Courses Operating Systems Courses Makefiles Courses Cross-Compilation Courses Hardware Hacking Courses

Course Description

Overview

Explore hacking and forensics techniques for mobile devices in this 49-minute conference talk by Phil Polstra at 44CON 2012. Learn about choosing the right platform, with a focus on Beagleboard, and discover methods for building a base device and cross-compilation. Delve into creating hardware accessories, WiFi and password cracking, and exploiting Windows 7 vulnerabilities. Gain insights on Udev rules and scripts, and get a glimpse of future directions in mobile hacking and forensics.

Syllabus

Hacking and Forensics on the Go
What is this talk about?
Why You Should Care
Roadmap
Choosing a Platform
And the winning Platform is...
Beagleboard
Selecting a Base OS
Building a Base Device
Native Compilation
Cross-Compile Method 1
Create a Project from the Makefile
Create a Build Configuration
Cross-Compile Method 3 (contd.) • Create /etc/hosts entry for BB-XM IP - On BB-XM install SSH & GDBServer
Create a Connection
Create Debug Configuration
Building Your Own Hardware Accessories
Chris John Riley
Demo 1 (contd.)
Wifi Cracking
Password Cracking
WPS Cracking
Pwn Win7 Like Its a
Clickiddies
Enter Udev Rules
Udev Rules Scripts (contd.)
Future Directions


Taught by

44CON Information Security Conference

Related Courses

Supply Chain Unchained - How To Be A Bad SaaS
44CON Information Security Conference via YouTube
Aviation Security 101
44CON Information Security Conference via YouTube
The Anti-Checklist Manifesto
44CON Information Security Conference via YouTube
Why Are We Still Doing Authentication Wrong?
44CON Information Security Conference via YouTube
What Do Hackers See When They Look at the Clouds
44CON Information Security Conference via YouTube