Главная
Study mode:
on
1
Intro
2
Industrial (r)evolution
3
Previous research
4
Industrial process control loop
5
Introduction to WirelessHART
6
Introduction to ISA 100.11a
7
WISN topology
8
Protocol stacks OSI
9
Common denominators
10
WirelessHART & ISA100.11a Security
11
WirelessHART encryption keys OSI
12
How to obtain key material
13
WirelessHART default join keys
14
Sniffer hardware selection
15
NXP USB-KW41Z
16
Kinetix Protocol Analyzer Adapter (sniffer)
17
USB-KW41Z host communication
18
USB-KW41Z block diagram
19
Building the toolset
20
Sniffing traffic with KillerBee and Wireshark
21
Superframe
22
Implementing Time Slotted Channel Hopping
23
Firmware Bare metal task scheduler
24
Bare Metal vs. RTOS
25
How to synchronize?
26
Channel selection
27
Channel hopping Scheduling
28
Sniffing with channel hopping
29
Unauthenticated attacks
30
Advertisement jamming
31
Future research
32
Questions & thank you
Description:
Explore the intricacies of attacking industrial wireless mesh networks in this comprehensive conference talk from the Hack In The Box Security Conference. Delve into the industrial revolution's impact on process control loops and gain a thorough understanding of WirelessHART and ISA 100.11a protocols. Examine the WISN topology, protocol stacks, and common denominators in industrial wireless networks. Learn about security measures, encryption keys, and methods to obtain key material. Discover the hardware and software tools needed for sniffing wireless traffic, including the NXP USB-KW41Z and Kinetis Protocol Analyzer Adapter. Master the implementation of Time Slotted Channel Hopping, firmware development, and synchronization techniques. Gain insights into channel selection, hopping schedules, and sniffing with channel hopping. Explore unauthenticated attacks, such as advertisement jamming, and discuss future research directions in industrial wireless network security.

Attacking Industrial Wireless Mesh Networks

Hack In The Box Security Conference
Add to list