Overview
Explore the fundamentals of radio exploitation in this comprehensive conference talk from HITBGSEC 2017. Delve into essential RF concepts, wireless attack classifications, and their parallels to wired exploits. Witness live demonstrations of various attack techniques, including sniffing, wardriving, replay attacks, jamming, MAC layer exploits, evil twin attacks, and firmware attacks. Gain valuable insights into the mechanics of radio-based network exploitation and learn how to apply IP network exploitation skills to the wireless domain. Understand the security implications of vulnerable wireless protocols in IoT devices and mobile technologies. Presented by Matt Knight and Marc Newlin, experienced security researchers from Bastille, this 47-minute session provides a thorough introduction to RF security concepts and practical attack methodologies.
Syllabus
Introduction
Presentation Overview
Background
Software Defined Radio
Wireless Vocabulary
Overview
Sniffing
Wardriving
Replay Attack
Jamming
MAC Layer
Evil Twin Attack
Firmware Attack
Physical Layer Select Targeting
Summary
Taught by
Hack In The Box Security Conference