Mapping the Wireless IoT
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the challenges and security implications of wireless Internet of Things (IoT) devices in this Black Hat conference talk. Dive into the world of radio frequency (RF) communication, learning about signal identification, protocol analysis, and potential vulnerabilities in IoT ecosystems. Discover best practices for revealing unknown signals and mapping the radio spectrum as part of security assessments. Gain insights into common issues such as insecure key exchanges, jamming, and message authentication spoofing. Follow along as the speaker demonstrates a new tool designed to help penetration testers easily identify and analyze wireless IoT communications. Understand the importance of proper RF gain settings, signal analysis techniques, and the potential security risks associated with various IoT devices and protocols. By the end of this talk, acquire valuable knowledge to enhance your cybersecurity strategy and address the often-overlooked vulnerabilities in the wireless IoT landscape.
Syllabus
Introduction
What is the Internet of Things
Problems with IoT
Life time
Security
Keyless Entry Systems
Knowledge Gap
Whats out there
How to discover signals
Additional information
Product documentation
Visual signal identification
Medical frequency band
Manchester encoding
Get your basics right
Choose a proper RF gain
Check what signal you are analyzing
Security issues
Encrypted communication
Key exchange
Jamming
Pairing
Message authentication spoofing
Insecure return procedures
Security testing tool
Scanning a hotel
How it looks like
Device on channel 20
SECP4 testing
SigPT sector
Usability
Conclusion
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube