YoVDO

Emanate Like A Boss - Generalized Covert Data Exfiltration With Funtenna

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Hardware Security Courses Data Exfiltration Courses

Course Description

Overview

Explore a groundbreaking software-only technique called Funtenna in this 55-minute Black Hat conference talk. Learn how Funtenna causes intentional compromising emanation in modern computing hardware for covert data exfiltration through secured and air-gapped networks. Discover how this generalized technique reliably encodes and emanates arbitrary data across a wide electromagnetic spectrum, from sub-acoustic to RF and beyond. Understand the hardware-agnostic nature of Funtenna, its ability to operate within various computer systems and embedded devices, and its specific design for hardware not intended as RF transmitters. Compare Funtenna to current state-of-the-art covert wireless exfiltration technologies, particularly RF-based retro-reflectors. Explore the history of compromising emanation research, delve into the theoretical mechanisms of Funtenna, and witness demonstrations of Funtenna implementations as small software implants in ubiquitous embedded devices like VoIP phones and printers, as well as common computer peripherals such as hard disks, console ports, and network interface cards.

Syllabus

Emanate Like A Boss: Generalized Covert Data Exfiltration With Funtenna


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube