Главная
Study mode:
on
1
Intro
2
Outline
3
Automatic Identification System
4
Required Installation
5
AIS Application Layer
6
Example
7
Programming a malicious route
8
Hijacking (Rouge Gateway)
9
Our Testing Lab
10
AIS Transmitter
11
Man-in-water Spoofing
12
Frequency Hopping (DoS++)
13
CPA Alerting
14
Malicious Weather Forecasting
15
Slot Starvation (DoS++)
16
Timing Attack (DoS++)
17
Attack the Application Layer
18
Real-World Experiment
19
Responsible Disclosure
20
Proposed countermeasures
Description:
Explore the vulnerabilities and potential attacks on Automatic Identification Systems (AIS) in this comprehensive Black Hat conference talk. Delve into the intricacies of AIS, including its application layer and required installation. Learn about various attack vectors such as programming malicious routes, hijacking through rogue gateways, and man-in-water spoofing. Discover advanced techniques like frequency hopping, CPA alerting, and malicious weather forecasting. Examine denial-of-service attacks, including slot starvation and timing attacks, as well as application layer vulnerabilities. Gain insights from real-world experiments and responsible disclosure practices. Conclude with a discussion on proposed countermeasures to enhance AIS security.

AIS Exposed - Understanding Vulnerabilities and Attacks 2.0

Black Hat
Add to list
0:00 / 0:00