Recent years have seen a flood of novel wireless exploits, from vulnerable medical devices to hacked OT devices, with exploitation moving beyond 802.11 and into more obscure standard and proprietary protocols. While other non-WiFi RF protocols remain a mystery to many security practitioners, exploiting them is easier than one might think. SDR is changing the game for both offense and defense.
Learning Objectives: 1: Become familiar with common security concerns and attack surfaces in a wireless communication system. 2: Understand the ease and prevalence of wireless exploitation, with sophisticated examples. 3: Learn to view IoT devices, security and privacy collectively.