Explore the dangers of rogue radio frequencies and learn tactics, techniques, and tools for identifying and locating potential threats in this 50-minute RSA Conference talk. Gain insights into the major ways rogue wireless frequencies can impact organizations, develop a basic understanding of locating rogue wireless signals, and acquire conversational knowledge of wireless signal identification and tracking methods. Discover real-life examples of common RF attacks, including user impersonation, wireless phishing, and device tracking. Delve into wireless attacks beyond WiFi, such as gate and door opening exploits and jamming attacks. Learn about radio frequency measurement, wave propagation, and penetration. Understand the differences between triangulation and trilateration for tracking down rogue access points. Acquire knowledge on wireless protections and how to find suitable solutions for your company. This talk is suitable for those with a basic understanding of security principles, wireless communication, and computer networks.
Read more
Hunting and Tracking Rogue Radio Frequency Devices