Главная
Study mode:
on
1
Intro
2
Presentation Goals
3
E-Z Pass System
4
Comparison of Protocols
5
Interoperability Updates
6
Original Challenge
7
First Steps - FCC ID
8
Specification Hunting
9
Specification Key Information
10
Specification - Communication Sequence
11
Specification - Frequencies
12
Modulation Types
13
On-Off Keying (OOK)
14
Manchester encoding
15
Tools
16
IQ Data - What is actually recorded?
17
GNU Radio - FFT
18
Why FFT?
19
Stuck at Almost Manchester
20
Clock Recovery MM
21
Reader Transponder Strength Complications
22
Packet Processing
23
Packet Dissection - Specification
24
IAG File Agreements
25
Dissector - Current State
26
Packet Dissector Demo
27
Amplitude Modulation - TX View
28
Original Readers
29
Reverse, Reverse!
30
Output Strength
31
Solution
32
Attack Vectors
33
E-ZPass Call (or, the Alternative Benefits of CYA)
34
Importance Revisited
35
What's Next?
36
Future of Toll Groups in the US
37
Lessons Learned
38
Questions?
Description:
Explore the latest developments in Software-Defined Radio (SDR) and toll booth reverse engineering in this 58-minute conference talk from BSides Columbus 2019. Delve into the E-Z Pass system, comparing protocols and examining interoperability updates. Learn about the original challenge, FCC ID identification, and specification hunting. Gain insights into key communication sequences, frequencies, and modulation types like On-Off Keying (OOK) and Manchester encoding. Discover essential tools and understand IQ data, GNU Radio, and FFT analysis. Investigate reader transponder strength complications, packet processing, and dissection techniques. Examine amplitude modulation from a transmitter perspective and explore original readers. Discuss potential attack vectors, the importance of this research, and the future of toll groups in the US. Conclude with valuable lessons learned and participate in a Q&A session.

EZHack - An Update on SDR and Toll Booth Reverse Engineering

Add to list
0:00 / 0:00