Overview
Explore the wireless world of the Internet of Things in this 53-minute conference talk from DerbyCon 4. Delve into topics such as command and control, practical security concerns, and potential attacks on IoT devices. Learn about wireless technologies for embedded systems, with a focus on Bluetooth vulnerabilities. Examine key management, network security, and common IoT standards. Gain insights into device mastering and re-mastering techniques, equipping you with essential knowledge to navigate the complex landscape of connected devices and their associated risks.
Syllabus
Intro
ABOUT
THINGS
COMMAND AND CONTROL
BIG PICTURE
PRACTICAL FEAR
ATTACKS
WIRELESS FOR EMBEDDED
EQUIP
BLUETOOTH
DOWN WITH THE KING
SPECS
KEYS
COMMON LINK KEY
NETWORK KEY
FUN WITH THE STANDARDS
WHO'S YOUR DADDY
RE-MASTER DEVICE