This session will discuss the use of radio frequency, often overlooked for network enumeration and attack. The techniques to be discuss are used to identify authorized and unauthorized signals in an organization. Without understanding the offensive attacks an organization can’t perform effective defense. The talk will explain and demonstrate how to enumerate and gain access to resources through RF signals.
1: Understand that wireless doesn’t just mean WiFi.
2: Understand that the Bluetooth protocol can allow for direct attacks against phones, PCs and other devices.
3: Learn that other RF attacks are very difficult to detect, and gain an understanding of what they look like.
The biggest prerequisite for our talk is an open mind and the ability to understand risk, and after the talk to better assess risk on your environment.
Mobile & IoT Security
threat management threat intelligence security services risk management risk & vulnerability assessment physical security penetration testing network security mobile security hackers & threats exploit of vulnerability endpoint security cyberterrorism cyber warfare & cyber weapons critical infrastructure BYOD
Share With Your Community