Главная
Study mode:
on
1
Intro
2
Acknowledgements
3
Software Defined Radio
4
Wireless in 2018
5
Embedded == Design by Compromise
6
IP Network Sniffing is Easy
7
Wireless Network Sniffing is Hard
8
Prototype Integrated Designs
9
Design Optimization
10
Offensive Security Research
11
RF Fuzzing
12
Defensive Security Applications
13
RF vs. Wired: Defining Attributes
14
Promiscuity Makes Recon Easy
15
Promiscuity and Attribution
16
Siren Jack
17
Dallas Tornado Siren Attack Demo
18
St. Jude / Abbott Pacemaker Attack
19
BlueBorne
20
Wireless lot Worms (1/2)
21
Physical Layer State Machine Attacks
22
Physical Layer State Machine Attack Demo
23
Chipset Fuzzing with TumbleRF
24
Conclusions
25
Intro
Description:
Explore the evolution of network security technology and the impact of Software Defined Radio on wireless attacks in this 48-minute RSA Conference talk. Delve into the vulnerabilities of wireless communication systems in the Internet of Things, from compromised insulin pumps to hacked public safety systems. Witness technical demonstrations of high-profile wireless attacks, including the Dallas Tornado Siren Attack and St. Jude/Abbott Pacemaker Attack. Gain insights into the ease and prevalence of wireless exploitation, RF fuzzing, and defensive security applications. Learn about the defining attributes of RF versus wired networks, and understand how promiscuity affects reconnaissance and attribution in wireless environments. Discover the challenges of wireless network sniffing and the implications of embedded system design compromises. Through live demos and in-depth analysis, grasp the changing landscape of offensive and defensive security in the era of commodified Software Defined Radio. Read more

It's in the Airwaves - Deconstructing 2017's Biggest RF Attacks

RSA Conference
Add to list