[ mainpage :: register :: conference :: training :: the venue ]
[ capture the flag (CTF) :: zone-h/hitb hacking challenge :: bzflag ]
[ call for papers (CFP) :: conference agenda :: sponsors :: press/media :: forum ]
[ conference kit (PDF) :: past conferences :: contact us ]

Keynote Videos Now Available for Download

Day 1 Keynote: Bruce Schneier - Schneier on Security
Day 2 Keynote: Jeremiah Grossman - Hacks Happen

TECH TRAINING 2 - Bluetooth & Wireless Hacking

Filed under: Main Page — Administrator @ 8:11 pm

Title: Bluetooth & Wireless Hacking
Trainer: Dino Covotsos (Managing Director, Telspace)
Capacity: 20 pax
Seats left: 5
Duration: 2 days
Cost: (per pax) USD1499 (early bird) / USD1799 (non early-bird)



Wireless networks are continually growing in our modern world and society. This 2 day course aims to demystify wireless network security and inform attendees on how to improve wireless LAN security and Bluetooth security. This will be achieved via theory and practical. Attendees will first obtain detailed theoretical analysis of different wireless security schemas (i.e. Theory), thereafter have hands on experience in how the attacks are performed (i.e. Practical).

Course Agenda
Day 1 - Wireless

Introduction to Wireless Hacking

Wireless and its technology usage
Wireless networking breakdown
Security of wireless and progression
What is wardriving?
Attacking wireless brief

Wireless Protocols and Architecture

Analysis of various wireless protocols
Wireless architecture and design
802.11 Protocol Analysis

Network Mapping and Methodology for securing wireless networks

Discovery of wireless networks

Antenna variations
Monitoring the wireless network, including packet analysis
Various toolsets including Netstumbler, Kismet, the Aero suites and so fourth

Wireless hacking tools and attacks

Traffic injection tools
Aircrack and Aero suite of tools
WEP hacking cracking
WPA, WPA2 hacking techniques
Frame generation

Defending against wireless hacking

Site layout and planning
Improving your wireless systems against hacker attacks

Day 2 – Bluetooth
Introduction to Bluetooth

What is Bluetooth?
What does it allow for?
How Bluetooth works
Bluetooth data rates
Bluetooth ranges and specifications
Introduction Bluetooth security (Scatternets)
Latest developments with Bluetooth

Bluetooth vulnerabilities overview

The Snarfing attack
The Bluebug attack
The backdoor attack
The social engineering factor
Bluetooth viruses
Bluetooth implementation problems

Bluetooth hacking tools and techniques

BTscan , Bluestumbler , Bluescan , BT Browser
Bloover II
Blueprinting (SDP tool)
Brute force discovery - Redfang
Optimising range of Bluetooth attacks

Defending against Bluetooth attacks

Bluetooth recommendations
Standard organizations practice
The future for Bluetooth security and implementations

Dino Covotsos

Dino Covotsos is the Founder and Managing Director of Telspace Systems, a South African IT security firm which started business in 2002. Mr. Covotsos has many years of experience in the IT security industry and has been involved in many different large scale projects worldwide, ranging from vulnerability assessment to attack and penetration testing for corporate clients. Mr.Covotsos uses his hands on knowledge to help secure corporate networks in new and unique ways and has also written articles for various magazines in the IT and Government sector specifically on information security issues.

Event Organizer

Hack In The Box (M) Sdn. Bhd.

Event Partner



Supported & Endorsed By

UAE Telecommunications Regulatory Authority (TRA)

Malaysian Communications and Multimedia Commission (MCMC)

Malaysian Administrative Modernisation & Management Planning Unit

Platinum Sponsors

Titanium Sponsor (Post Conference Reception)


Gold Sponsors


Microsoft Corporation

Official Media Partner (Magazine)

Network Middle East

Arabian Computer News

ITP Business

Official Airline Partner

Emirates Airlines

Our Speakers are Supported By

Bellua Asia Pacific

Supporting Media:

Virus Bulletin

Virus Bulletin (VB)

InfoSec News

(ISN) InfoSec News

InfoSec News

XAKEP (Russia)

Insecure Magazine

PHRACK Magazine

Hakin9 Magazine

Supporting Organizations


ISECOM - Insititue for Security and Open Methodologies

ISACA Malaysia

IT Underground

X-Focus China

Zone-H Defacement Mirror

Xatrix Security

Special Interest Group in Security & Information InteGrity Singapore