Overview
Syllabus
Intro
Story Time
Questions to ask yourself...
Benefits of wireless attacks
Real Life Examples of common RF attacks
User Impersonation & Wireless Phishing
Attackers gather lots of Data
Collecting Device and User Metadata
Tracking People and Devices
Wireless Attacks extend past WiFi
Opening Gates & Doors
Jamming Attacks
Detecting and Locating
How do we measure Radio Frequencies?
Example Radio Frequencies
Radio Wave Propagation & Penetration
Okay nerd, so what?
Triangulation vs Trilateration
Tracking down rogue access points
How to find a solution for your company?
Wireless Protections
Apply What You Have Learned Today
Taught by
RSA Conference