Overview
Syllabus
Introduction
Eavesdropping analog baby monitors
Analog baby monitors?
Using upconvertors
Finding the signal using Spectrum analysis
Denodulating the signal
What home alarms use RF- remotes?
The hardware
Replay attacks with GNURadio
Amplitude (an) Modulation
Using cluster analysis to determine pulse widths
Mitigation
Interfacing with the microcontroller • Disassembly reveals labelled KPK and test
Reading secret passcodes
Analysing the rolling code
Phase space analysis of the rolling codes
Testing codes
Bruteforce?
Does it work?
Conclusion
Taught by
Black Hat