Length: 3 Days
Print Friendly, PDF & Email

Offensive Link 16 Exploitation Training

Offensive Link 16 Exploitation Training is a unique training course which offers pentesters the ability to assess and exploit the security of Link 16 systems. The training will cover different varieties of Link 16 networks, terminals, devices, assessing their attack surfaces, analyzing cybersecurity test and evaluation, risk assessment with RMF and analyzing exploits for them. The 2-day (or 3-day) class will be based on theatrical systems.

Participants will learn about architecture of Link 16 devices, and then analyzing software, hardware, firmware. We will identify attack surface, finding vulnerabilities and then finally exploiting the vulnerabilities.

Who Should Attend

This course is designed for systems engineers, hardware and software design engineers, managers, analysts, security professionals and penetration testers, embedded developers, and employees with little or no Link 16 or security experience. The course is also useful for those who have experience with Link 16 but have never had any formal security training.

Learn about Link 16 systems, analysis and design, architecture, protocols, applications, cyber security and Offensive Link 16 exploitation issues.

Learning Objectives

Upon completion of this course, the attendees are be able to:

  • Understand Link 16 protocol, architecture, and functional characteristics
  • Explain the architecture of Link 16
  • Describe Link 16 functional characteristics
  • Explain technical components, design, operations and, testing aspects of Link 16
  • Describe the key cyber security concepts in Link 16
  • List the requirements and capabilities of Link 16 security
  • Explore vulnerabilities and weaknesses of Link 16 applied to aircraft and weapons
  • Illustrate Keys design process steps of a Link 16 system and cybersecurity issues
  • Learn how to extract and analyze Link 16 device firmwares and software
  • Exploit Link 16 through MIL-STD-1553 databus
  • Dump firmware through various techniques
  • Debug hardware and software
  • Conventional and Un-conventional attack techniques
  • Side Channel Attacks (Clock, Vcc glitching, breaking crypto)
  • Write exploits for the platforms

Course Content

Overview of Link 16

  • Overview of Link 16 standard
  • Link 16 systems, tools, and applications
  • Characteristics of Link 16 -capable systems

Link 16 Security

  • Link 16 Network and System Security
  • Security Definitions
  • Equipment originating or terminating classified plain text language
  • Wirelines, equipment, and the interconnecting lines
  • Wirelines, components, equipment, and systems
  • Encrypted or unclassified signals
  • Electrical circuits components, equipment, systems
  • Investigations and studies of compromising emanations
  • TEMPEST
  • System Security Policy
  • Link 16 design (system, hardware, and software)
  • Operational, maintenance, and logistic
  • Security policy of the aircraft, ship, or system

Link 16 Advanced Network System Security 

  • Cyber security and cyber war analysis of multiplex data bus networks to 121212itary aircraft systems, aircraft carriers and smart weapons
  • Classification of data across Link 16
  • RED, BLACK, and RED/BLACK designation of Link 16
  • TEMPEST tests, TEMPEST inspections and TEMPEST control plan
  • Link 16 System Security Policy

Link 16 System Security Architecture

  • Compromising emanations (i.e., TEMPEST)
  • Encryption and Ciphering
  • Trusted message routing and control across Link 16 bus
  • All BLACK bus – No RED data or RED data processor
  • ALL RED bus
  • RED/BLACK Gateway
  • RED/BLACK Composite
  • TEMPEST Design
  • Hybrid Link 16 and Link16 Cyber Security Analysis
  • Link 16 Analysis
  • Encryption Designs
  • Cryptographic key management, coordination, distribution, and zeroize techniques, circuitry and software
  • Synchronization and timing protocols
  • Encryption alarm and alarm check techniques
  • Trusted Message Routing and Control Design
  • Store Station Utilizing Primary Signal Set

Link 16 Offensive Exploitations 

  • Link 16 Threats
  • Cybersecurity Policy
  • Cybersecurity T&E Process
  • Five Pillars of cyber defense
  • Risk Management Framework Process
  • Link 16 Architectures and System of Systems
  • Penetration Testing & Security Analysis
  • Link 16 Attack Surfaces
  • Link 16 Cyberattacks
  • Link 16 Jamming
  • Exploit Link 16 terminals through MIL-1553 databus
  • Exploit Link 16 terminals wirelessly
  • Dump firmware through various techniques
  • Debug hardware and software
  • Conventional and Un-conventional attack techniques
  • Side Channel Attacks (Clock, Vcc glitching, breaking crypto)
  • Write exploits for the platforms
  • Intrusion Detection System for Link 16 and MIL-STD-1553 Communication Bus

 

 

Request More Information

Please enter contact information followed by your questions, comments and/or request(s):
  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.