Posted on
in Presentations
Recent years have seen a flood of novel wireless exploits, from vulnerable medical devices to hacked OT devices, with exploitation moving beyond 802.11 and into more obscure standard and proprietary protocols. While other non-WiFi RF protocols remain a mystery to many security practitioners, exploiting them is easier than one might think. SDR is changing the game for both offense and defense.
Learning Objectives:
1: Become familiar with common security concerns and attack surfaces in a wireless communication system.
2: Understand the ease and prevalence of wireless exploitation, with sophisticated examples.
3: Learn to view IoT devices, security and privacy collectively.
Learning Objectives:
1: Become familiar with common security concerns and attack surfaces in a wireless communication system.
2: Understand the ease and prevalence of wireless exploitation, with sophisticated examples.
3: Learn to view IoT devices, security and privacy collectively.
Share With Your Community