RSAConference 2019 San Francisco March 4-8 Moscone Center
2
Agenda
3
Evolving loT/OT landscape
4
Internet of things threat model
5
Inside the radio wave spectrum?
6
Why Focus on RF Security?
7
IoT Components for Smart Building
8
PHY LAYER
9
So what is SDR?
10
GNU Radio GNU Radio is a framework that enables users to design simulate, and deploy highly capable real world radio systems.
11
Hardwares and Softwares
12
Initial Profiling of our device
13
Phases of RF Attacks
14
Information Gathering
15
Information Extracted from FCC
16
Frequency
17
Modulation
18
Transmission
19
Case study: Dallas Siren Hack
20
Replay Attack (Disadvantages)
21
How is it done?
22
Signal Hunting
23
Case study: Car RKE
24
RF Protocols
25
Types of RF Attacks
26
Internet of Radio Vulnerability
27
Privacy, Rules, and Regulations
28
Walk through of what we covered
29
APPLY
30
Thank You..!
Description:
Explore RF exploitation techniques for IoT and OT hacking using Software-Defined Radio in this 45-minute RSA Conference talk. Delve into the evolving IoT/OT landscape, threat models, and the radio wave spectrum. Learn about SDR, GNU Radio, and hardware/software tools for initial device profiling. Examine various phases of RF attacks, including information gathering, signal hunting, and replay attacks. Investigate case studies like the Dallas Siren Hack and Car RKE vulnerabilities. Gain insights into RF protocols, types of RF attacks, and the Internet of Radio Vulnerability. Discuss privacy concerns, rules, and regulations surrounding wireless exploitation. Acquire practical knowledge to understand common security concerns in wireless communication systems, recognize the prevalence of sophisticated wireless exploits, and develop a holistic view of IoT device security and privacy.
RF Exploitation - IoT and OT Hacking with Software-Defined Radio