top of page

JUSTIFICATION AND OVERVIEW:

Electronic Access Control Systems (EACS), such as the swipe cards frequently encountered in hotels and workplaces, have increasingly replaced or supplemented traditional mechanical locks. The advent and widespread adoption of EACS technology impose new challenges on the Covert Method of Entry (CMOE) Operator. Now, these professionals must navigate both conventional and electronic security measures during the entry and exit stages of covert operations.

 

This course is tailored to provide individuals with no prior technical background in this area with the necessary knowledge to accurately assess what is operationally feasible. Additionally, it equips them with the skills to overcome common security technologies, including RFID, magnetic swipe, and PIN-based Access Control Systems. By delving into the exploitation of prevalent vulnerabilities within EACS, participants will develop a thorough understanding of these systems and their components. This comprehensive insight covers cloning, emulation, and the privilege escalation of access cards; brute force attacks against access cards; advanced cryptographic key cracking methods; and the strategic use of electronic reader devices.

 

To ensure the content remains relevant and up-to-date, the course will also explore the latest developments in access control technologies, including biometric authentication methods and advanced encryption techniques used in next-generation access systems. Emphasis will be placed on practical, hands-on exercises simulating real-world scenarios, empowering participants to apply these critical skills in the field effectively. By the end of the course, you’ll not only have a solid grasp of the workings behind electronic access systems but also the practical know-how to navigate them. Whether it’s for personal knowledge or professional development, this course will open doors—sometimes quite literally!

 

BOTTOM LINE UP FRONT:

This course educates students on how to clone, defeat and manipulate RFID Electronic Access Control Systems to gain access to an locked environment

 

CONDITIONS OF ENTRY:

Students are not required to have any specific experience before participating in this course. A solid technical aptitude, and soldering would be advantageous. The completion of other courses in the CCA series is strongly recommended, or equivalent training will lay a robust groundwork for this course.

 

Course Content:

The course is laid out to demystify these modern keys and locks. Here's what you can expect to learn:

 

1. Basics of Access Control: You'll start with the fundamentals—what EACS are, how they're different from the lock and key on your front door, and why they're important.

 

2. Operational Assessment: You'll learn how to look at a security system and figure out how it might be navigated during sensitive tasks without anyone knowing you're there.

 

3. Understanding Security Technology: We’ll break down the types of electronic access—like those card swipes at work or PIN pads at the ATM—into easy-to-understand concepts.

 

4. Overcoming Electronic Barriers: You'll gain skills to deal with common security technologies. If you’ve ever wondered how a swipe card works, you’ll find out, and you’ll learn how they can be bypassed.

 

5. Hands-on Practical Skills: The course emphasises practical exercises. We won’t just talk at you; we’ll have you try out the techniques yourself in simulated scenarios.

 

6. Up-to-Date Techniques: As technology advances, so do security measures. You’ll be introduced to the latest in biometric systems (like fingerprint and facial recognition) and learn about the newest encryption methods to understand how secure these systems really are.

 

7. Real-World Applications: Finally, you’ll discover how to apply all these skills in real situations. Whether it's for a potential career path or just to sate your curiosity, you’ll leave the course with a new set of skills that could be used in various scenarios.

 

RFID Overview

• What is RFID?

• What makes RFID special are vulnerabilities and access methods.

• What technology make up Modern EACS

• Legal considerations.

Attacking the target

• How to Clone RFID

• How to Clone BTLE

• Emulating Devices

• Grabbing the NONCES

• Attacking the reader

• Attacking the Card

• Security methods in place

5 Day - Advanced Cyber Offensive Strategies for Access Control Systems

$11,200.00Price
Quantity
    bottom of page