Sébastien Dudek 📡

@FlUxIuS@infosec.exchange
342 Followers
158 Following
181 Posts
Founder of @Penthertz. Networks and computer security engineer in #Wireless systems, #SDR, #Mobile, #CarHacking and #IoT
🚀 Don't want to spend big 💰💰💰 on USRP Bxxx + hours on 5G setup? Try our new bladeRF image - deploys everything in seconds! ⚡️
Try our dedicated image for https://rfswift.io!
#bladeRF #5G #SDR #rfswift
RF Swift

The epic RF companion for your assessments

🔦 Our #pts25 program is out and booking site is up!

Let's start browsing together this awesome program with the #hardware & #Embedded session 🤩

- 📡 @FlUxIuS from @Penthertz will present #RFSwift a powerfull toolbox for wireless assessments !

- 👾 Aline Becq will expose her RETEX on building/running LabCyber, a fablab dedicated to CyberSecurity

- and Vincent LOPES from @quarkslab will speak about debugging embedded systems using unusual methods 🤔

🎟️ Book your (free) seat: https://pretix.eu/passthesalt/2025/

📖 Program: https://cfp.pass-the-salt.org/pts2025/schedule/

📅 July 1 to 3, 2025
📍 Lille, FR

Pass the SALT 2025

July 1st – 3rd, 2025

Stop procrastinating on RF hacking! 🚀 Install RF-Swift in ONE command:
curl -fsSL 'https://get.rfswift.io/' | sh
Let’s make some noise! 📡✨
https://rfswift.io/
🚀 RF Swift v0.6.0 is here! 🛡️ Now with host & network isolation, it's become THE essential tool for security work. No more host reinstallation, VM or burner laptop headaches! #RFSwift 📡✨
👉 Release: https://github.com/PentHertz/RF-Swift/releases/tag/v0.6.0
Release v0.6.0 · PentHertz/RF-Swift

Changelog 444b6b2 Adding Unprivileged mode feature with capabilities and seccomp profiles features 229b24b Adding cgroup rules feature + recalibrating caps 2ac1ce6 Avoid duplicates for aliases 4aa...

GitHub
📢 Guess what? A new version of RF Swift has been released with new powerful features but this is not the end! 🥳

🚀 RF Swift is getting even bigger: the Hardware section is now live!
Explore supported gear and setups to power up your RF adventures.
Check it out here 👉 https://rfswift.io/docs/guide/list-of-tools

#RFSwift #RFsecurity #Hardware #SIGINT #COMINT

Included tools

📈 RF Swift is still in active development so more tools will be expected, and will readapted for all architectures as possible. RF Swift prebuilt images are compiled with tools you can discover in the next sections.

📢 Meet us today in the Tech lab event, room TL08 at INCyber Lille 🍟🔐 for a nice presentation on radiocommunication security 📡📶
🔗 https://tinyurl.com/Phzincyberlille2025
(TL08) (INCYBER) Radio Spectrum Recognition and Exploitation

Radiofrequency (RF) interfaces play a critical role in modern technologies, enabling connectivity for a wide range of devices such as Internet of Things (IoT) objects, electric vehicles (EVs), robotic systems, and critical infrastructures. While these interfaces offer innovative and practical solutions, they also expose attack surfaces that are often overlooked or poorly understood. If exploited by malicious actors, these vulnerabilities can compromise not only the confidentiality and security of data but also the availability of critical systems. This technical presentation aims to shed light on these risks by exploring specific vulnerabilities associated with RF communications. We will discuss methods to discover, analyze, and, in some cases, exploit these vulnerabilities for the purposes of security evaluation and reinforcement. During this session, participants will be introduced to methodologies and tools used in SIGINT (Signal Intelligence) and COMINT (Communication Intelligence) tasks. We will highlight practical and accessible approaches, with a particular focus on leveraging minimal, low-cost equipment to intercept and analyze RF communications. Through live demonstrations, we will showcase how these tools can be applied to identify and understand critical vulnerabilities. We will cover techniques for: Detection and Analysis of RF Signals: Steps to intercept and analyze communications between various connected devices. Identification of Attack Surfaces: How to locate and map potential entry points in modern systems. Reproduction and Exploitation of Captured Communications: Practical techniques for manipulating identified RF transmissions. Affordable Setup: Implementing an effective testing environment on a limited budget using open-source tools. The demonstrations will reinforce theoretical concepts, highlighting real-world examples such as exploiting vulnerabilities in IoT devices or connected vehicles.

🚨 Catch us at INCyber Lille (Apr 1-2), Cyber On Board (May 14-15), Hardwear.io (May 21-23) & Pass the Salt (Jul 1-3)! 💻🔐🛠️🌊
HydraNFC v2 sniffer decoder is available now for HydraNFC Shield v2 NFC
The HydraNFC v2 sniffer decoder is compatible with DSView & Sigrok/PulseView (requires a compatible Logic Analyzer with at least 10MHz on CSO channel)
It support ISO14443-A/MifareClassic…
For more details send an email to https://hydrabus.com/contact
For more details see https://hydrabus.com/hydranfc-v2-sniffer-decoder-specifications
Nice video by Penthertz
HydraNFC v2: Real-Time NFC Sniffing & Cracking Powerhouse
with Fully Open Source HydraNFC v2 Sniffer Decoder for DSView & Sigrok/PulseView
https://www.youtube.com/watch?v=2Cf_BwMrgbk
🔥 HydraNFC v2: Real-Time NFC Sniffing & Cracking Powerhouse 🔥

YouTube