Emanate Like A Boss - Generalized Covert Data Exfiltration With Funtenna
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a groundbreaking software-only technique called Funtenna in this 55-minute Black Hat conference talk. Learn how Funtenna causes intentional compromising emanation in modern computing hardware for covert data exfiltration through secured and air-gapped networks. Discover how this generalized technique reliably encodes and emanates arbitrary data across a wide electromagnetic spectrum, from sub-acoustic to RF and beyond. Understand the hardware-agnostic nature of Funtenna, its ability to operate within various computer systems and embedded devices, and its specific design for hardware not intended as RF transmitters. Compare Funtenna to current state-of-the-art covert wireless exfiltration technologies, particularly RF-based retro-reflectors. Explore the history of compromising emanation research, delve into the theoretical mechanisms of Funtenna, and witness demonstrations of Funtenna implementations as small software implants in ubiquitous embedded devices like VoIP phones and printers, as well as common computer peripherals such as hard disks, console ports, and network interface cards.
Syllabus
Emanate Like A Boss: Generalized Covert Data Exfiltration With Funtenna
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube