YoVDO

Emanate Like A Boss - Generalized Covert Data Exfiltration With Funtenna

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Hardware Security Courses Data Exfiltration Courses

Course Description

Overview

Explore a groundbreaking software-only technique called Funtenna in this 55-minute Black Hat conference talk. Learn how Funtenna causes intentional compromising emanation in modern computing hardware for covert data exfiltration through secured and air-gapped networks. Discover how this generalized technique reliably encodes and emanates arbitrary data across a wide electromagnetic spectrum, from sub-acoustic to RF and beyond. Understand the hardware-agnostic nature of Funtenna, its ability to operate within various computer systems and embedded devices, and its specific design for hardware not intended as RF transmitters. Compare Funtenna to current state-of-the-art covert wireless exfiltration technologies, particularly RF-based retro-reflectors. Explore the history of compromising emanation research, delve into the theoretical mechanisms of Funtenna, and witness demonstrations of Funtenna implementations as small software implants in ubiquitous embedded devices like VoIP phones and printers, as well as common computer peripherals such as hard disks, console ports, and network interface cards.

Syllabus

Emanate Like A Boss: Generalized Covert Data Exfiltration With Funtenna


Taught by

Black Hat

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network