RF Exploitation: IoT and OT Hacking with Software-Defined Radio

Closed captioning will be available in English and Japanese for all keynotes and RSAC track sessions.
Please note: All times are in SGT.
  1. Moscone West

Recent years have seen a flood of novel wireless exploits, from vulnerable medical devices to hacked OT devices, with exploitation moving beyond 802.11 and into more obscure standard and proprietary protocols. While other non-WiFi RF protocols remain a mystery to many security practitioners, exploiting them is easier than one might think. SDR is changing the game for both offense and defense.

Learning Objectives:
1: Become familiar with common security concerns and attack surfaces in a wireless communication system.
2: Understand the ease and prevalence of wireless exploitation, with sophisticated examples.
3: Learn to view IoT devices, security and privacy collectively.

Download pdf