YoVDO

Radio Exploitation 101

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses IoT security Courses Software-Defined Radio Courses Security Research Courses

Course Description

Overview

Explore the fundamentals of radio exploitation in this comprehensive conference talk from HITBGSEC 2017. Delve into essential RF concepts, wireless attack classifications, and their parallels to wired exploits. Witness live demonstrations of various attack techniques, including sniffing, wardriving, replay attacks, jamming, MAC layer exploits, evil twin attacks, and firmware attacks. Gain valuable insights into the mechanics of radio-based network exploitation and learn how to apply IP network exploitation skills to the wireless domain. Understand the security implications of vulnerable wireless protocols in IoT devices and mobile technologies. Presented by Matt Knight and Marc Newlin, experienced security researchers from Bastille, this 47-minute session provides a thorough introduction to RF security concepts and practical attack methodologies.

Syllabus

Introduction
Presentation Overview
Background
Software Defined Radio
Wireless Vocabulary
Overview
Sniffing
Wardriving
Replay Attack
Jamming
MAC Layer
Evil Twin Attack
Firmware Attack
Physical Layer Select Targeting
Summary


Taught by

Hack In The Box Security Conference

Related Courses

A developer's guide to the Internet of Things (IoT)
IBM via Coursera
Enterprise and Infrastructure Security
New York University (NYU) via Coursera
Getting Started with the Internet of Things (IoT)
Microsoft via edX
AWS IoT: Developing and Deploying an Internet of Things
Amazon Web Services via edX
Components And Applications Of Internet Of Things
Indian Institute of Technology Patna via Swayam