It's in the Airwaves - Deconstructing 2017's Biggest RF Attacks

It's in the Airwaves - Deconstructing 2017's Biggest RF Attacks

RSA Conference via YouTube Direct link

Conclusions

24 of 25

24 of 25

Conclusions

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

It's in the Airwaves - Deconstructing 2017's Biggest RF Attacks

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Acknowledgements
  3. 3 Software Defined Radio
  4. 4 Wireless in 2018
  5. 5 Embedded == Design by Compromise
  6. 6 IP Network Sniffing is Easy
  7. 7 Wireless Network Sniffing is Hard
  8. 8 Prototype Integrated Designs
  9. 9 Design Optimization
  10. 10 Offensive Security Research
  11. 11 RF Fuzzing
  12. 12 Defensive Security Applications
  13. 13 RF vs. Wired: Defining Attributes
  14. 14 Promiscuity Makes Recon Easy
  15. 15 Promiscuity and Attribution
  16. 16 Siren Jack
  17. 17 Dallas Tornado Siren Attack Demo
  18. 18 St. Jude / Abbott Pacemaker Attack
  19. 19 BlueBorne
  20. 20 Wireless lot Worms (1/2)
  21. 21 Physical Layer State Machine Attacks
  22. 22 Physical Layer State Machine Attack Demo
  23. 23 Chipset Fuzzing with TumbleRF
  24. 24 Conclusions
  25. 25 Intro

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.