Главная
Study mode:
on
1
Introduction
2
What is the Internet of Things
3
Problems with IoT
4
Life time
5
Security
6
Keyless Entry Systems
7
Knowledge Gap
8
Whats out there
9
How to discover signals
10
Additional information
11
Product documentation
12
Visual signal identification
13
Medical frequency band
14
Manchester encoding
15
Get your basics right
16
Choose a proper RF gain
17
Check what signal you are analyzing
18
Security issues
19
Encrypted communication
20
Key exchange
21
Jamming
22
Pairing
23
Message authentication spoofing
24
Insecure return procedures
25
Security testing tool
26
Scanning a hotel
27
How it looks like
28
Device on channel 20
29
SECP4 testing
30
SigPT sector
31
Usability
32
Conclusion
Description:
Explore the challenges and security implications of wireless Internet of Things (IoT) devices in this Black Hat conference talk. Dive into the world of radio frequency (RF) communication, learning about signal identification, protocol analysis, and potential vulnerabilities in IoT ecosystems. Discover best practices for revealing unknown signals and mapping the radio spectrum as part of security assessments. Gain insights into common issues such as insecure key exchanges, jamming, and message authentication spoofing. Follow along as the speaker demonstrates a new tool designed to help penetration testers easily identify and analyze wireless IoT communications. Understand the importance of proper RF gain settings, signal analysis techniques, and the potential security risks associated with various IoT devices and protocols. By the end of this talk, acquire valuable knowledge to enhance your cybersecurity strategy and address the often-overlooked vulnerabilities in the wireless IoT landscape. Read more

Mapping the Wireless IoT

Black Hat
Add to list