Sébastien Dudek -@FlUxIuS
Why we are here today?
What kind of hardware or software do you need? Why would a security professional want to know how to use SDR tools and attacks?
What other kinds of attacks can be launched? (I mean, other than replay type attacks)
Door systems (badge systems)
NFC? Contactless credit card attacks
Smart building/home control systems
Point Of Sale systems
Cellular radio 3g/4g/5g
Industrial control systems
Medical telemetry systems
DASH7 - Wikipedia - custom TCP stack for LoRa
Hunting mobile devices endpoints - the RF and the Hard way | Synacktiv - Sébastien Dudek
Supply chain attacks - systems tend to use wireless chipsets or protocols
LTE-torpedo-NDSS19.pdf (uiowa.edu) -privacy attacks on 4g/5g networks using side channel information
How does someone make a faraday cage on the cheap? (mentioned in one of your class agendas)
Lots of IoT devices use your typical home wifi connection, can’t you just sniff packets to get what you need?
Replay attacks on car fobs: Jam and Replay Attacks on Vehicular Keyless Entry Systems (s34s0n.github.io)
Attacks on Tesla wireless entry: Tesla’s keyless entry vulnerable to spoofing attack, researchers find - The Verge
Garage door opener attacks: How to Hack a Garage Door in Under 10 Seconds and What You Can Do About It - ITS Tactical
Kid’s toy opens garage doors: This Hacked Kids' Toy Opens Garage Doors in Seconds | WIRED
What are the current limitations to testing wireless and RF related systems? What about custom wireless implementations?
I’m a wireless manufacturer of some kind of device. I’m freaked now by hearing you talk about how easy it is to attack wireless systems. What are some things I could do to ensure that the types of attacks we discussed here cannot affect me?
List of SDR software: The BIG List of RTL-SDR Supported Software (rtl-sdr.com)