Главная
Study mode:
on
1
Intro
2
Story Time
3
Questions to ask yourself...
4
Benefits of wireless attacks
5
Real Life Examples of common RF attacks
6
User Impersonation & Wireless Phishing
7
Attackers gather lots of Data
8
Collecting Device and User Metadata
9
Tracking People and Devices
10
Wireless Attacks extend past WiFi
11
Opening Gates & Doors
12
Jamming Attacks
13
Detecting and Locating
14
How do we measure Radio Frequencies?
15
Example Radio Frequencies
16
Radio Wave Propagation & Penetration
17
Okay nerd, so what?
18
Triangulation vs Trilateration
19
Tracking down rogue access points
20
How to find a solution for your company?
21
Wireless Protections
22
Apply What You Have Learned Today
Description:
Explore the dangers of rogue radio frequencies and learn tactics, techniques, and tools for identifying and locating potential threats in this 50-minute RSA Conference talk. Gain insights into the major ways rogue wireless frequencies can impact organizations, develop a basic understanding of locating rogue wireless signals, and acquire conversational knowledge of wireless signal identification and tracking methods. Discover real-life examples of common RF attacks, including user impersonation, wireless phishing, and device tracking. Delve into wireless attacks beyond WiFi, such as gate and door opening exploits and jamming attacks. Learn about radio frequency measurement, wave propagation, and penetration. Understand the differences between triangulation and trilateration for tracking down rogue access points. Acquire knowledge on wireless protections and how to find suitable solutions for your company. This talk is suitable for those with a basic understanding of security principles, wireless communication, and computer networks. Read more

Hunting and Tracking Rogue Radio Frequency Devices

RSA Conference
Add to list
0:00 / 0:00