EZHack - An Update on SDR and Toll Booth Reverse Engineering

EZHack - An Update on SDR and Toll Booth Reverse Engineering

via YouTube Direct link

Comparison of Protocols

4 of 38

4 of 38

Comparison of Protocols

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

EZHack - An Update on SDR and Toll Booth Reverse Engineering

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Presentation Goals
  3. 3 E-Z Pass System
  4. 4 Comparison of Protocols
  5. 5 Interoperability Updates
  6. 6 Original Challenge
  7. 7 First Steps - FCC ID
  8. 8 Specification Hunting
  9. 9 Specification Key Information
  10. 10 Specification - Communication Sequence
  11. 11 Specification - Frequencies
  12. 12 Modulation Types
  13. 13 On-Off Keying (OOK)
  14. 14 Manchester encoding
  15. 15 Tools
  16. 16 IQ Data - What is actually recorded?
  17. 17 GNU Radio - FFT
  18. 18 Why FFT?
  19. 19 Stuck at Almost Manchester
  20. 20 Clock Recovery MM
  21. 21 Reader Transponder Strength Complications
  22. 22 Packet Processing
  23. 23 Packet Dissection - Specification
  24. 24 IAG File Agreements
  25. 25 Dissector - Current State
  26. 26 Packet Dissector Demo
  27. 27 Amplitude Modulation - TX View
  28. 28 Original Readers
  29. 29 Reverse, Reverse!
  30. 30 Output Strength
  31. 31 Solution
  32. 32 Attack Vectors
  33. 33 E-ZPass Call (or, the Alternative Benefits of CYA)
  34. 34 Importance Revisited
  35. 35 What's Next?
  36. 36 Future of Toll Groups in the US
  37. 37 Lessons Learned
  38. 38 Questions?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.