RF Exploitation - IoT and OT Hacking with Software-Defined Radio

RF Exploitation - IoT and OT Hacking with Software-Defined Radio

RSA Conference via YouTube Direct link

Evolving loT/OT landscape

3 of 30

3 of 30

Evolving loT/OT landscape

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

RF Exploitation - IoT and OT Hacking with Software-Defined Radio

Automatically move to the next video in the Classroom when playback concludes

  1. 1 RSAConference 2019 San Francisco March 4-8 Moscone Center
  2. 2 Agenda
  3. 3 Evolving loT/OT landscape
  4. 4 Internet of things threat model
  5. 5 Inside the radio wave spectrum?
  6. 6 Why Focus on RF Security?
  7. 7 IoT Components for Smart Building
  8. 8 PHY LAYER
  9. 9 So what is SDR?
  10. 10 GNU Radio GNU Radio is a framework that enables users to design simulate, and deploy highly capable real world radio systems.
  11. 11 Hardwares and Softwares
  12. 12 Initial Profiling of our device
  13. 13 Phases of RF Attacks
  14. 14 Information Gathering
  15. 15 Information Extracted from FCC
  16. 16 Frequency
  17. 17 Modulation
  18. 18 Transmission
  19. 19 Case study: Dallas Siren Hack
  20. 20 Replay Attack (Disadvantages)
  21. 21 How is it done?
  22. 22 Signal Hunting
  23. 23 Case study: Car RKE
  24. 24 RF Protocols
  25. 25 Types of RF Attacks
  26. 26 Internet of Radio Vulnerability
  27. 27 Privacy, Rules, and Regulations
  28. 28 Walk through of what we covered
  29. 29 APPLY
  30. 30 Thank You..!

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.