Download pdf
This session will discuss the use of radio frequency, often overlooked for network enumeration and attack. The techniques to be discuss are used to identify authorized and unauthorized signals in an organization. Without understanding the offensive attacks an organization can’t perform effective defense. The talk will explain and demonstrate how to enumerate and gain access to resources through RF signals.

Learning Objectives:
1: Understand that wireless doesn’t just mean WiFi.
2: Understand that the Bluetooth protocol can allow for direct attacks against phones, PCs and other devices.
3: Learn that other RF attacks are very difficult to detect, and gain an understanding of what they look like.

Pre-Requisites:
The biggest prerequisite for our talk is an open mind and the ability to understand risk, and after the talk to better assess risk on your environment.
Presenters