Overview
Explore a groundbreaking software-only technique called Funtenna in this 55-minute Black Hat conference talk. Learn how Funtenna causes intentional compromising emanation in modern computing hardware for covert data exfiltration through secured and air-gapped networks. Discover how this generalized technique reliably encodes and emanates arbitrary data across a wide electromagnetic spectrum, from sub-acoustic to RF and beyond. Understand the hardware-agnostic nature of Funtenna, its ability to operate within various computer systems and embedded devices, and its specific design for hardware not intended as RF transmitters. Compare Funtenna to current state-of-the-art covert wireless exfiltration technologies, particularly RF-based retro-reflectors. Explore the history of compromising emanation research, delve into the theoretical mechanisms of Funtenna, and witness demonstrations of Funtenna implementations as small software implants in ubiquitous embedded devices like VoIP phones and printers, as well as common computer peripherals such as hard disks, console ports, and network interface cards.
Syllabus
Emanate Like A Boss: Generalized Covert Data Exfiltration With Funtenna
Taught by
Black Hat