Completed
Unauthenticated attacks
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Attacking Industrial Wireless Mesh Networks
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Industrial (r)evolution
- 3 Previous research
- 4 Industrial process control loop
- 5 Introduction to WirelessHART
- 6 Introduction to ISA 100.11a
- 7 WISN topology
- 8 Protocol stacks OSI
- 9 Common denominators
- 10 WirelessHART & ISA100.11a Security
- 11 WirelessHART encryption keys OSI
- 12 How to obtain key material
- 13 WirelessHART default join keys
- 14 Sniffer hardware selection
- 15 NXP USB-KW41Z
- 16 Kinetix Protocol Analyzer Adapter (sniffer)
- 17 USB-KW41Z host communication
- 18 USB-KW41Z block diagram
- 19 Building the toolset
- 20 Sniffing traffic with KillerBee and Wireshark
- 21 Superframe
- 22 Implementing Time Slotted Channel Hopping
- 23 Firmware Bare metal task scheduler
- 24 Bare Metal vs. RTOS
- 25 How to synchronize?
- 26 Channel selection
- 27 Channel hopping Scheduling
- 28 Sniffing with channel hopping
- 29 Unauthenticated attacks
- 30 Advertisement jamming
- 31 Future research
- 32 Questions & thank you