Главная
Study mode:
on
1
Introduction
2
Outline
3
Disclaimers
4
Lifefire
5
Air Gaps
6
Previous research
7
Ambient light sensors
8
Could an attack a crate malware
9
Proof of concept
10
Exfiltration
11
Example
12
Dreddphone
13
Demo
14
Spectrogram
15
Mitigation
16
Laser microphones
17
Sniffing infrared signals
18
Playing back infrared signals
19
Infrared motion detectors
20
Phone to Doorbell
21
Active Infrared Motion Detector
22
Delayed Auditory Feedback
23
Delayed Sidetone
24
Gilmore Gilmore
25
Upshot
26
Astro Drones
27
Autonomous Vehicles
28
Drone repellant
29
Summary
30
Pros Cons
31
Mitigations
32
Future research
33
References
Description:
Explore innovative hacking techniques using light and sound in this BruCON Security Conference talk. Discover how to leverage off-the-shelf hardware for C2 channels, exfiltration, and surveillance, bypassing traditional security protections. Learn about light-based and near-ultrasonic sound attacks, disabling motion detectors, laser microphones, and even catapulting drones. Gain insights into real-world case studies, advantages and disadvantages of these methods, and potential future developments. Understand how these techniques work and their practical applications in penetration testing. Explore mitigation strategies for defenders to counter these novel attack vectors. Dive into topics such as ambient light sensors, air gap breaches, infrared signal manipulation, and delayed auditory feedback. Conclude with a summary of pros and cons, mitigations, and future research directions in this cutting-edge area of cybersecurity.

Hacking Invisibly and Silently with Light and Sound

BruCON Security Conference
Add to list