Главная
Study mode:
on
1
Intro
2
Speaker Introduction
3
Exfiltration Methods
4
Smart Watch Exfiltration
5
Windows Virtual WiFi (7, 8, & 10)
6
Wireless Rogues on Network - Virtual WiFi
7
lot Protocol Exfiltration
8
Exploitation of SSDP-ULA OPT Field
9
UDP - Exploitation of SSDP
10
lot Device Critical Considerations
11
Exfiltration Case Study and Demo
12
Python Script to Exfiltrate Data using SSDP
13
Prescription for better non-Exfil Hygiene
Description:
Explore the world of IoT data exfiltration in this 47-minute RSA Conference talk. Delve into various IoT protocols and frequencies, including SSDP, P25, Zigbee, Z-Wave, and WiFi, to understand their potential for data exfiltration and network infiltration. Learn through real-world examples, sample code, and demonstrations how these IoT communications can be exploited. Gain insights into detecting aberrant behavior from IoT devices and discover techniques to protect your network. Examine specific exfiltration methods, including Smart Watch and Windows Virtual WiFi exploits, as well as the exploitation of SSDP-ULA OPT Field. Participate in a hands-on case study and demo, featuring a Python script for data exfiltration using SSDP. Conclude with essential considerations for IoT device security and a comprehensive prescription for improved non-exfiltration hygiene.

Exfiltrating Data Through IoT

RSA Conference
Add to list
0:00 / 0:00