RF Exploitation: IoT and OT Hacking with Software-Defined Radio

Posted on in Presentations

Recent years have seen a flood of novel wireless exploits, from vulnerable medical devices to hacked OT devices, with exploitation moving beyond 802.11 and into more obscure standard and proprietary protocols. While other non-WiFi RF protocols remain a mystery to many security practitioners, exploiting them is easier than one might think. SDR is changing the game for both offense and defense.

Learning Objectives:
1: Become familiar with common security concerns and attack surfaces in a wireless communication system.
2: Understand the ease and prevalence of wireless exploitation, with sophisticated examples.
3: Learn to view IoT devices, security and privacy collectively.

Harshit Agrawal


Security Researcher, MIT Academy of Engineering, SPPU

Himanshu Mehta


Team Lead (Senior Threat Analysis Engineer), Symantec

Hackers & Threats

operational technology (OT Security) Internet of Things infrastructure security cyber warfare & cyber weapons access control



Share With Your Community