Hackers of India

HAXPO: RF Exploitation: Demystifying IoT/OT Hacks with SDR

By  Himanshu Mehta   Harshit Agrawal  on 10 May 2019 @ Hitb Sec Conf


Presentation Material

Abstract

What do the Dallas tornado siren attack, hacked electric skateboards, and insecure smart door locks have in common? Vulnerable wireless protocols. The number of IoT devices is growing at an alarming rate. Many of these devices go unnoticed. The problem is that the software used by many of these devices lack basic security measures that we take for granted in regular computer software. Furthermore, security advisories are almost non-existent for IoT.

Exploration and use of software-defined radio to exploit the world we live in, full of interconnected devices, which makes convenient to keep remote things at fingertips. During this talk I will set the stage for how IoT is dramatically increasing the attack surface available to threat actors, what different steps are involved in RF attacks, how IoT devices have already been utilized for attacks (such as the Mirai botnet), how difficult it can be to fix IoT security issues as well as illustrating some changes that need to happen in the industry to enable us to securely use IoT going forward by eliminating top Internet of Radio Vulnerabilities.

AI Generated Summarymay contain errors

Here is a summary of the content:

RF Security Threats

Internet of Radio (IoR)

Privacy Rules and Regulations

Compliance for IT Organizations

Securing the RF World