YoVDO

Mapping the Wireless IoT

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Penetration Testing Courses Encryption Courses Signal Analysis Courses IoT security Courses

Course Description

Overview

Explore the challenges and security implications of wireless Internet of Things (IoT) devices in this Black Hat conference talk. Dive into the world of radio frequency (RF) communication, learning about signal identification, protocol analysis, and potential vulnerabilities in IoT ecosystems. Discover best practices for revealing unknown signals and mapping the radio spectrum as part of security assessments. Gain insights into common issues such as insecure key exchanges, jamming, and message authentication spoofing. Follow along as the speaker demonstrates a new tool designed to help penetration testers easily identify and analyze wireless IoT communications. Understand the importance of proper RF gain settings, signal analysis techniques, and the potential security risks associated with various IoT devices and protocols. By the end of this talk, acquire valuable knowledge to enhance your cybersecurity strategy and address the often-overlooked vulnerabilities in the wireless IoT landscape.

Syllabus

Introduction
What is the Internet of Things
Problems with IoT
Life time
Security
Keyless Entry Systems
Knowledge Gap
Whats out there
How to discover signals
Additional information
Product documentation
Visual signal identification
Medical frequency band
Manchester encoding
Get your basics right
Choose a proper RF gain
Check what signal you are analyzing
Security issues
Encrypted communication
Key exchange
Jamming
Pairing
Message authentication spoofing
Insecure return procedures
Security testing tool
Scanning a hotel
How it looks like
Device on channel 20
SECP4 testing
SigPT sector
Usability
Conclusion


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube