What is PACS Bypass Course

Participants will explore the complexities of Physical Access Control Systems (PACS), including elements such as PACS tokens, RFID credentials, readers, alarm interfaces, tamper switches, door controllers, and globally utilized backhaul protocols. The course provides an in-depth look at modern access control systems, emphasizing typical design vulnerabilities that could be exploited.

Penetration testers will acquire hands-on skills in navigating real-world PACS environments, mastering techniques for intercepting, cloning, downgrading, replaying, and circumventing these systems. Meanwhile, defenders, system designers, and administrators will learn critical defensive strategies and best practices to safeguard against attacks.

Course Curriculum

  • Understanding PACs architecture
  • Technological Foundations
  • Assessing systems on an engagement
  • Attacking Credentials
  • 125Khz - Prox, AWID, EM, etc
  • 13.56Khz, iClass, Mifare, DESFire, ISO1443A and more
  • Exploration of different attack tools
  • Security Access Modules
  • Weaponising Readers
  • Cloning Credentials
  • Technology Downgrade attacks
  • Bypassing sensors
  • Manipulation of Physical PACs locking mechanisms
  • PACs control traffic interception and relaying
  • Denial of Service Attacks

Each student will leave with a comprehensive toolkit containing everything they need to get started in this up-and-coming area of Red Teaming, Penetration Testing, and Consultancy.

Our value

In addition to acquiring essential skills for assessing Physical Access Systems, this course offers numerous benefits for aspiring students:

  1. Expert Instruction: Learn from seasoned professionals with over 20 years of experience in information security, ensuring top-tier guidance throughout the training.
  2. Cutting-Edge Techniques: Stay ahead in the field with the latest methods in PACS security, including remote and up-close physical reconnaissance, PACS assessment, card cloning, PACS bypassing, and more.
  3. Comprehensive Toolkit: Each student will receive a comprehensive toolkit, equipping them with the necessary tools to excel in Red Teaming, Penetration Testing, and Consultancy.
  4. Networking Opportunities: Connect with like-minded professionals and experts in the industry, fostering valuable connections for future collaborations and career advancement.
  5. Career Readiness: Be prepared to enter the dynamic field of information security confidently, armed with the knowledge and skills demanded by employers in this rapidly evolving landscape.

PACS Bypass Course

Uncover the vulnerabilities in physical access systems and learn how to leverage these weaknesses.

€2,750

  • 2 days
  • on site in Prague, Czechia
  • tools available

Join the Waitlist

Our courses have a limited number of seats and tend to sell out rapidly. Secure your spot in advance, and we will contact you when spaces become available.

Join the Waitlist for a PACS course
Other Courses

Other Courses

CMoE Course

Learn how to covertly bypass locks, doors, and other security protection systems.

Security for Executives

Acquire a guide for managing cybersecurity crises and apply the knowledge through participation in a real-life exercise.

AI OffSec Course

Master the use of LLMs for sophisticated Red Teaming operations.

Contact

Contact

Our Location

Prague, Czechia