Recent years have seen a flood of novel wireless exploits, from vulnerable medical devices to hacked OT devices, with exploitation moving beyond 802.11 and into more obscure standard and proprietary protocols.
This session will introduce audiences to the world of RF analysis. As we introduce each new attack, we will draw parallels to similar wired exploits, and highlight attack primitives that are unique to RF. During the session, we'll walk through wireless sniffing, spoofing, cloning, replay, and DoS attacks. These offensive exercises will give one brief idea of how to analyze the devices' security, and the best practices guidelines will help to design them properly.
There will be a demo on "How to reverse engineer RF signals", "Simulation of Dallas Siren Hack", "Silent gigs, quiet clubs or rave parties are a relatively emerging trend which widely works in 33Mhz/863MHz/915Mhz ISM Band, practical demonstration of exploiting such devices".
Session Objectives- Become familiar with common security concerns and attack surfaces in a wireless communication system
- Understand the ease and prevalence of wireless exploitation, with sophisticated examples
- Encourage the audience to view IoT devices, security, and privacy collectively.