Overview
Explore the world of wireless security research in this Black Hat conference talk that delves into the hybrid approach of using Software-Defined Radio (SDR) and non-SDR tools for reverse engineering wireless signals. Learn about the strengths and weaknesses of SDR technology, and discover how combining it with other tools can enhance the efficiency of the reverse engineering process. Follow along as the speaker demonstrates a practical example, covering topics such as FCC ID, FFT, spectrograms, RF Cat, binary repetition, symbol periods, and decoding techniques. Gain insights into real-world applications, including the work of notable researchers Samy Kamkar and Mike Ryan on the Stealth Lock system. Conclude with a discussion on replay attacks and participate in a Q&A session to deepen your understanding of rapid radio reversing techniques.
Syllabus
Intro
What is SDR
SDR Strengths
SDR Weaknesses
NonSDR Weaknesses
NonSDR Strengths
SDR Weakness
Samy Kamkar
Mike Ryan
Stealth Lock
FCC ID
FFT
Spectrogram
Cursor
RFCAT
Mode M
RF Listen
Binary
Repetition
RF Cat
Valid
Symbol Period
Decode
Cheat
Lock
Questions
Replay Attack
Taught by
Black Hat