DEF CON 26 PACKET HACKING VILLAGE — Chen and Yang — Grand Theft Auto Digital Key Hacking
The security of automobiles accesses control system is a topic often discussed. Today’s vehicles rely on key-fob control modules, to…Подробнее
The security of automobiles accesses control system is a topic often discussed. Today’s vehicles rely on key-fob control modules, to…Подробнее
Sure, WiFi hacking has been around for a while, and everyone knows about tools like airmon-ng, kismet, et al. But…Подробнее
Perimeter defenses are holding an important role in computer security. However, when we check the method of APT groups, a…Подробнее
Data exfiltration through DNS typically relies on the use of DNS query fields to exfiltrate data via the attacker’s DNS…Подробнее
Have you ever been asked ‘what is the best way to protect against $ATTACK’? (usually shortly after $ATTACK makes headlines).…Подробнее
Given the challenge of locating a static Access Point this presentation highlights our strategy, pitfalls, and success.
Talk will focus on privacy (or lack thereof) of gotenna networks. We will cover traditional attacks which have only been…Подробнее
Present, and (hopefully) Demo using a raspberry pi to detect wifi signal strength via audio click frequency.
BlueTooth is everywhere, it is in all of our pockets and the only protection most use is not being in…Подробнее
Talk will focus on privacy (or lack thereof) of gotenna networks. We will cover traditional attacks which have only been…Подробнее
North American railroads use several wireless systems for remote control, monitoring, and tracking of locomotives, railcars, signals, and other equipment.…Подробнее
Whilst 802.15.4 technologies such as Zigbee have been around for some time, our understanding of threats and risks associated with…Подробнее
In 2017 Defcon alumnai Gabrial Ryan presented his research on using statistical analysis to detect rogue wifi signals. In this…Подробнее
The purpose of BLE CTF (https://github.com/hackgnar/ble_ctf) is to teach the core concepts of Bluetooth low energy client and server interactions.…Подробнее
Using cheap commodity RF hardware to act as secure or backchannel communications for security research and pen tests. Wireless communication…Подробнее
What happens when a Pineapple, a Turtle and a Squirrel get high…up in the clouds? It’s been a solid year…Подробнее
Attribution is hard. Typically, the most useful identifiers—IP addresses, email address, domains, and so on—are also the easiest things to…Подробнее
It’s always been suspected that the Mormon Church is worth billions of dollars and has a sizable amount of investments…Подробнее
“If you have ever performed reconnaissance on a target or conducted an OSINT investigation you know that there are a…Подробнее
Government bureaucracy is your friend. The US federal government alone produces tens of thousands of different forms that collect information…Подробнее
When a security professional who is running a SANS training course challenges you to ‘Socially engineer the answer to the…Подробнее
Thanks to the ‚Äúboom‚Äù in the information security industry combined with the latest buzzwords, more and more large corporate companies…Подробнее