Главная
Study mode:
on
1
Introduction
2
Presentation Overview
3
Background
4
Software Defined Radio
5
Wireless Vocabulary
6
Overview
7
Sniffing
8
Wardriving
9
Replay Attack
10
Jamming
11
MAC Layer
12
Evil Twin Attack
13
Firmware Attack
14
Physical Layer Select Targeting
15
Summary
Description:
Explore the fundamentals of radio exploitation in this comprehensive conference talk from HITBGSEC 2017. Delve into essential RF concepts, wireless attack classifications, and their parallels to wired exploits. Witness live demonstrations of various attack techniques, including sniffing, wardriving, replay attacks, jamming, MAC layer exploits, evil twin attacks, and firmware attacks. Gain valuable insights into the mechanics of radio-based network exploitation and learn how to apply IP network exploitation skills to the wireless domain. Understand the security implications of vulnerable wireless protocols in IoT devices and mobile technologies. Presented by Matt Knight and Marc Newlin, experienced security researchers from Bastille, this 47-minute session provides a thorough introduction to RF security concepts and practical attack methodologies.

Radio Exploitation 101

Hack In The Box Security Conference
Add to list