Learn Excel & Financial Modeling the Way Finance Teams Actually Use Them
Advanced Techniques in Data Visualization - Self Paced Online
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a groundbreaking security conference talk that reveals the first public disclosure and analysis of TETRA (Terrestrial Trunked Radio) cryptography - a standard widely used by government agencies, police, military, and critical infrastructure worldwide. Dive deep into the radio jailbreaking process that exposed previously secret cipher suites (TEA and TAA1) kept under restrictive NDAs for decades. Learn about multiple security flaws enabling passive and active adversaries to intercept and manipulate TETRA traffic, including a discovered backdoored stream cipher. Follow the technical journey through reverse-engineering and exploiting 0-day vulnerabilities in Motorola MTM5x00 radio and TI OMAP-L138 TEE, covering side-channel attacks on DSPs, custom decompiler development, and achieving code execution on Motorola MBTS TETRA base stations for research purposes.
Syllabus
DEF CON 31 - Tetra Tour de Force Jailbreaking Digital Radios & Base Stations for Fun - Midnight Blue
Taught by
DEFCONConference