AASecure

Official Website

OUR COURSES

AARSC conducts researches on communications and computing security technologies; research findings are shared to the public in form of Training, Workshops, Consultancy and Publications. Two methods of teaching are offered:

MOBILE NETWORK OPERATORS AS AN AVENUE FOR CYBER WARFARE - UNCOVERING, TRICKS AND TACTICS.

Description: Although GSM/GPRS/UMTS/n-G/LTE technology is rapidly growing, the emergence of widely available hardware and software tools for GSM hacking makes easier even for script kiddies to hack these networks. Since the introduction of SS7/SIGTRAN to LTE and later technologies, GSM networks have become just like any other IP networks; this means, all threats faced by traditional IP networks do exist to GSM/GPRS/UMTS/n-G/LTE networks. The good news is, these threats (vulnerabilities) can be scanned (identified) and fixed (mitigated).

Because of that, AARSC LTD has designed a three day workshop that will add knowledge in detecting security threats against GSM networks. As such, the workshop will teach and demonstrate hacking techniques and tools used in breaking GSM security, web servers and cryptosystems. We’ll illustrate how GSM vulnerability can be used as an avenue for cyber warfare and cyber espionage.

 

Date: Aug, 2020
Venue: Arusha
PRACTICAL HACKING COURSE FOR PoS AND ELECTRONIC PAYMENT SYSTEMS.
Description:  Payment recording systems and systems processing personal information about taxpayers are increasingly attractive targets for cyber criminals. Hackers may modify the information that is stored in the database of the tax authorities. For example, cyber criminals managed to hack the system of the Uganda Revenue Authority (URA) in June 2012 and fraudulently facilitated the customs clearance of 200 vehicles. Similarly, in October 2017 the Nigeria Customs Service (NCS) was hacked by fraudsters who used stolen passwords of customs officers. As a result of the hack, the government of Nigeria lost billions of Naira.

There are many ways in which hackers can use; for example, by hacking cash registers and manipulating their memory, they can enable to avoid payment of various taxes, e.g., income tax, VAT, and sales tax. Traditionally, the hack of cash registers were usually performed by applying technologies known as zappers or phantom-ware. These days, there exist various tools some of which are open sources to perform the same. Zappers are physical devices that allow criminals to prevent sales transactions from appearing on business’ financial records. Phantom-ware is a software which creates virtual sales terminals. While a zapper is more likely to be placed on the server in a point-of-sale system, phantom-ware most often inhabits stand-alone cash registers.

Date: On Demand
Venue: On Demand
Audience: Reserve Banks, Regulators, Tax Authority, Revenue Collectors
Details: Contact aarsc@aasecure.co.tz Director of Training dt@aasecure.co.tz 255 789 222202
PRACTICAL HACKING COURSE FOR PoS AND ELECTRONIC PAYMENT SYSTEMS.
Payment recording systems and systems processing personal information about taxpayers are increasingly attractive targets for cyber criminals. Hackers may modify the information that is stored in the database of the tax authorities. For example, cyber criminals managed to hack the system of the Uganda Revenue Authority (URA) in June 2012 and fraudulently facilitated the customs clearance of 200 vehicles. Similarly, in October 2017 the Nigeria Customs Service (NCS) was hacked by fraudsters who used stolen passwords of customs officers. As a result of the hack, the government of Nigeria lost billions of Naira.

There are many ways in which hackers can use; for example, by hacking cash registers and manipulating their memory, they can enable to avoid payment of various taxes, e.g., income tax, VAT, and sales tax. Traditionally, the hack of cash registers were usually performed by applying technologies known as zappers or phantom-ware. These days, there exist various tools some of which are open sources to perform the same. Zappers are physical devices that allow criminals to prevent sales transactions from appearing on business’ financial records. Phantom-ware is a software which creates virtual sales terminals. While a zapper is more likely to be placed on the server in a point-of-sale system, phantom-ware most often inhabits stand-alone cash registers.

Date: On Demand
Venue: On Demand