Adversary Simulation Techniques and Methodologies
Details
In this workshop, we will be doing an introduction to Hardware Hacking and a brief introduction to physical penetration testing.
We will be also talking about the devices that penetration testers use and need in their physical penetration testing journey.
We would also do some demos with the devices that will be presented and perform some famous attacks.
Regarding the attacks, we will be demonstrating the following:
- Physical Keyloggers: we will demonstrate how a physical keylogger can be used to grab passwords and show the features of that device.
- Software-Defined Radio: we will be showing how radio signals can be studied using software-defined radio and spectrum analyzers.
- USB Rubber Duckies: we will be showing how a USB rubber ducky can be used to gain a meterpreter session on a targeted device.
Related topics
Social Media
Online Marketing
Web Design
Software Development
Web Technology
