RF Exploitation: IoT and OT Hacking with Software-Defined Radio


Posted on in Presentations

Recent years have seen a flood of novel wireless exploits, from vulnerable medical devices to hacked OT devices, with exploitation moving beyond 802.11 and into more obscure standard and proprietary protocols. While other non-WiFi RF protocols remain a mystery to many security practitioners, exploiting them is easier than one might think. SDR is changing the game for both offense and defense.

Learning Objectives:
1: Become familiar with common security concerns and attack surfaces in a wireless communication system.
2: Understand the ease and prevalence of wireless exploitation, with sophisticated examples.
3: Learn to view IoT devices, security and privacy collectively.

Participants
Harshit Agrawal

Participant

Security Researcher, MIT Academy of Engineering, SPPU

Himanshu Mehta

Participant

Team Lead (Senior Threat Analysis Engineer), Symantec

Hackers & Threats

operational technology (OT Security) Internet of Things infrastructure security cyber warfare & cyber weapons access control


Topic

Subtopic


Share With Your Community