To ensure RF security, one needs to have a comprehensive understanding of the technology, threats, exploits, and defensive techniques along with experience in evaluating and attacking. This session takes an in-depth look at the security challenges of many different RF attacks, exposing one to wireless security threats through the eyes of an attacker. During the workshop, we’ll walk through wireless sniffing, spoofing, cloning, replay, and DoS attacks. These offensive exercises will give one brief idea of how to analyze the devices’ security, and the best practice guidelines will help to design them properly.
Workshop Outline:
1. Joys of the Past: History of Attack: From hijacking communication in 1903 to breaking the Enigma during WWII, Wireless Attacks have evolved significantly over the years. While these attacks have attempted to cripple cities, they also provide an opportunity to learn from such incidents and appropriately build security controls to safeguard against them.
2. Current State of Industry & Sutra for Mitigation: Detailed usage guide of wireless security tools Security issues in various kinds of wireless systems: short distance 433/315MHz communication, ADS-B, GSM, satellite communication, etc
3. A glimpse of the Future: Hackers have a new way to profit off our security cameras, smart lighting, and even our fancy new coffee pot: crypto-jacking, we will discuss how one can detect and prevent such attacks.