SlideShare une entreprise Scribd logo
1  sur  34
Télécharger pour lire hors ligne
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
Bringing Software Defined Radio to the
penetration testing community
Jean-Michel PICOD
Arnaud LEBRUN
Jonathan-Christofer DEMAY
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
2
More & more connected objects:
8.7 billion in 2012
12.5 billion in 2014 (100 more per second)
50 billion expected by 2020
Source: Cisco
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
3
43 million smart meters in the U.S. in 2012
Source: U.S. Energy Information Administration
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
4
DRAFT NIST IR 7628 Revision 1
Guidelines for Smart Grid Cyber Security (Vol. 3)
(p.85)
Examples of security research tools yet to be started:
Devices to easily interact with, capture, and analyze traffic of metering networks for different vendors.
Currently, the best toolset available is the software-defined radio named USRP2 from Ettus Research,
costing roughly $2k. This toolset allows for RF analysis and indeed can capture data bits. However, the ideal
toolset would allow an analyst's computer to interface to the metering networks and provide an appropriate
network stack in a popular operating system such as Linux
"
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
5
Difficulties
• Multiple radio protocols
• Multiple bands
–ISM (433 MHz, 868 MHz, 900 MHz, 2.4 GHz)
–Proprietary (e.g. wM-Bus on 169 MHz)
• Multiple modulations
• Multiple bitrates
• Multiple applicative layers
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
Existing tools
• Ubertooth (http://ubertooth.sourceforge.net) by Michael Ossmann
o Dedicated to bluetooth and BTLE
• rfCat (http://code.google.com/p/rfcat) by Atlas of d00m
o Only compatible with a subset of Chipcon based dongles
o Sub-GHz ISM band
o 2.4 GHz (dev in progress)
o Grabs raw packets ; no protocol decoding
• Apimote (http://www.riverloopsecurity.com) by Ryan M. Speers
o Targets Zigbee
30 June 2014
Bringing Software Defined Radio to the penetration testing community
6
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
7
Moore’s law to the rescue:
“ Over the history of computing hardware, the number of
transistors in a dense integrated circuit doubles approximately
every two years”
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
8
Software Defined Radio
• Configurable local oscillator ; no hardwired processing done
• From 20$ to 20,000$
• Compromise between size / performance / price is from 300$ to 1000$
• Became very popular and affordable since RTL-SDR hack
• All can listen, some can also send:
Credit: http://greatscottgadgets.com/hackrf/
Bringing Software Defined Radio to the penetration testing community
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
Introduction to GNU Radio & scapy
30 June 2014 9
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
10
GNU Radio
GNU Radio is a framework
• Click’n play GUI (GNU Radio Companion)
• gr-modtool to help extend it
• Python and C++
• Supports a lot of SDR
• Lots of great tutorials (+ Michael Ossmann’s trainings)
• Basic blocks available to do blind signal analysis inside
• And of course, it’s open source software (GPLv3)
Signal processing as a Lego® game!
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
11
Scapy
“Interactive packet manipulation program”
• Used world-wide by pentesters
• Full Python code
• Supported under Windows, Linux, Mac OSX, etc.
• Easy to extend
• Lots of protocols already supported
• Native fuzzing capabilities
• Some more high level tools available based on scapy
Bringing Software Defined Radio to the penetration testing community
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
Introducing scapy-radio
30 June 2014 12
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
13
How does it work?
SCAPY
IN socket OUT socket
GNU Radio graph (GRC)
OUT socket IN socket
Software Defined Radio
layer
layer
layer
layer
SuperSocket scapy
layer
layer
layer
layer
layer
layer
layer
layer
UDP + custom
"GNU Radio" layer
XMLRPC
control
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
Why a UDP socket?
• Natively supported in GnuRadio
• TUN/TAP requires to be root. UDP doesn’t
• Creating a custom interface did not sound a good idea
• Easy to forward (netcat, socat, etc.)
• Could be more easy to build a cluster with UDP
30 June 2014
Bringing Software Defined Radio to the penetration testing community
14
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
Gnuradio header
• Total = 8 bytes
• 7 bytes "reserved for future use"
– Channel
– RSSI
– Anything that needs a per packet use
• Protocol ID on 1 byte
– 0 = Invalid packets
– 1 = Zwave
– 2 = 802.15.4 (ZigBee, 6LoWPAN, etc.)
– 3 = Bluetooth LE
– 4 = wM-Bus
– 5 = Dash7
We are also providing helpers!
This GRC block prepends a message with the header
This one filters received packets and strips the header
30 June 2014
Bringing Software Defined Radio to the penetration testing community
15
protocol 0x00 0x00 0x00 0x00 0x00 0x00 0x00
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
16
We are releasing…
• Modified version of scapy  scapy-radio
– 802.15.4 layer + Zigbee + 6LoWPAN (taken and adapted from scapy-com)
– Bluetooth 4 LE layer (advertising)
– Zwave layer
– XBee layer
• GNU Radio flowgraphs (GRC) for Ettus USRP2 B210
– 802.15.4
– Bluetooth 4 LE
– Zwave
• Tools
– Passive Zwave discovering
– Example of Zwave automaton
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
17
Known limitations
• SDR cannot do dynamic channel hopping
– Workaround: listen wide + Xlating FIR filter
• Bandwidth limitation
– On radio side
– On computer side (USB bus)
• GNU Radio does not tell when the graph is
running
• The overall setup cannot be fast
• It won’t give you superpowers…
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
18
Disclaimer
Unless you are living in a Faraday cage, don’t
forget to check your local regulation if you
want/need to transmit!
Bringing Software Defined Radio to the penetration testing community
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
What we studied
30 June 2014 19
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
Zwave home automation devices
• Magnetic sensor
• Alarm device
• Network controller
• Opensource software on Raspberry Pi
• Based on open-zwave stack
• No support of cryptography (unfortunately)
30 June 2014 20
Bringing Software Defined Radio to the penetration testing community
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
Zwave – side findings
• If you transmit too fast, it crashes the software! • Want to reverse the firmware too?
– Zen-Sys seems to be the leader
– ZW301 ASIC (8051 core inside)
– Crappy SPI protocol
• Added support in GoodFET
– More on our blog
– http://blog.cassidiancybersecurity.com/post/2014/02/Dumping-firmware-from-ASIC
30 June 2014
Bringing Software Defined Radio to the penetration testing community
21
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
Bluetooth LE e-cigarette
• Using TI CC2540 SoC
• Firmware heavily based on TI examples 
• Difficult audit (advertising only for now)
– Poor signal (even Ubertooth lost packets)
– SDR clustering to get a wider spectrum
• Potential threats:
– Privacy issues (sniffing consumption)
– Health issues?
– Firmware corruption OTA
– Cascaded attack (hack the e-cigarette that, in
turn hacks the iPhone/Android)
30 June 2014 22
Bringing Software Defined Radio to the penetration testing community
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
XBee UART bridge
• Cheap & ready-to-use, therefore popular devices
• Custom protocol over 802.15.4
– Start of implementation of the layer in scapy
• In fact 802.15.4 is troublesome
– No way to determine your payload type
– Zigbee? 6LoWPAN? XBee?
30 June 2014 23
Bringing Software Defined Radio to the penetration testing community
Bringing Software Defined Radio to the penetration testing community
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
Roadmap
30 June 2014 24
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
25
Roadmap
• Provide functions in scapy to set/get GRC variables
• Write a Wireshark plugin to read the pcap we produce
• Leverage the header to put metadata
• Add functions to handle a cluster of (computer + SDR)
• Add/test more protocols
– wM-Bus
– Dash7
– Others…
Bringing Software Defined Radio to the penetration testing community
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
How to add a protocol in that tool
Concrete stuff starts!
30 June 2014 26
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
27
Step 1 – GNU Radio blocks
1. Choose a protocol ID for the GnuRadio protocol header
2. Build your graph as usual in GRC to receive
3. Create a custom “packet sink” (state automaton)
• Checks for access code
• Converts the bitstream into a frame
• Removes invalid frames (invalid CRC)
• Prepends the “GNU Radio” header (or use the helper)
4. Test it
5. Invert the graph to transmit
6. Create a custom “preamble” block
• Prepends preamble bytes
• Adds couples of null bytes at the end (important)
7. Test it again
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
28
Step 2 – scapy layer
1. Write your required layer(s)
• Beware of pre_dissect() / post_build()
• Don’t forget hashret() and answers() when possible
2. Test it
3. Done!
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
29
Step 3 – Tie GRC and scapy layer together
1. Put the GRC file in $HOME/.scapy/radio
DO NOT change the default GRC ID variable!
2. Edit scapy/layer/gnuradio.py
• Bind GnuradioPacket and your layer
3. [optional] Edit scapy/module/gnuradio.py
• Add your layer name in the list
4. Update the install of scapy
5. Send us a pull-request for your contributions! 
Bringing Software Defined Radio to the penetration testing community
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
Demonstration
30 June 2014 30
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
31
Demo – Zwave
scapy-radio
Attacker sideHome automation side
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
32
Demo – Zwave automaton
Inits the automaton, loads
Zwave GRC
Wait for a packet…
If the packet matches, go
to WAITING state
If the transition issued a
raise, modify the packet
and send it back…
…but not too fast, remember!
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
Where to get this?
• Requirements:
• GNU Radio 3.7
• A compatible SDR
• Already provided in Kali or SamuraiSTFU
• Get the code from our repository:
• hg clone http://bitbucket.cassidiancybersecurity.com/scapy-radio
• cd scapy-radio
• ./install.sh
30 June 2014
Bringing Software Defined Radio to the penetration testing community
33
Bringing Software Defined Radio to the penetration testing community
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
Thank you for your attention.
Questions?
30 June 2014 34

Contenu connexe

En vedette

En vedette (20)

PTES: PenTest Execution Standard
PTES: PenTest Execution StandardPTES: PenTest Execution Standard
PTES: PenTest Execution Standard
 
Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malwareMobile hacking, pentest, and malware
Mobile hacking, pentest, and malware
 
Pentest with Metasploit
Pentest with MetasploitPentest with Metasploit
Pentest with Metasploit
 
iOS Hacking: Advanced Pentest & Forensic Techniques
iOS Hacking: Advanced Pentest & Forensic TechniquesiOS Hacking: Advanced Pentest & Forensic Techniques
iOS Hacking: Advanced Pentest & Forensic Techniques
 
Universal software defined radio development platform
Universal software defined radio development platformUniversal software defined radio development platform
Universal software defined radio development platform
 
Software Defined Radio Engineering course sampler
Software Defined Radio Engineering course samplerSoftware Defined Radio Engineering course sampler
Software Defined Radio Engineering course sampler
 
eMAPT
eMAPTeMAPT
eMAPT
 
webhacking
webhackingwebhacking
webhacking
 
PRLSAMP PP Presentation
PRLSAMP PP PresentationPRLSAMP PP Presentation
PRLSAMP PP Presentation
 
Playin with Password
Playin with PasswordPlayin with Password
Playin with Password
 
Exploit Development with Python
Exploit Development with PythonExploit Development with Python
Exploit Development with Python
 
Software Defined Radio
Software Defined RadioSoftware Defined Radio
Software Defined Radio
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Penetrasi Jaringan
Penetrasi JaringanPenetrasi Jaringan
Penetrasi Jaringan
 
IPTV Security
IPTV SecurityIPTV Security
IPTV Security
 
Social Network Security & Backdooring email
Social Network Security & Backdooring emailSocial Network Security & Backdooring email
Social Network Security & Backdooring email
 
iCrOSS 2013_Pentest
iCrOSS 2013_PentestiCrOSS 2013_Pentest
iCrOSS 2013_Pentest
 
Software-defined radio: The Wireless Revolution
Software-defined radio: The Wireless RevolutionSoftware-defined radio: The Wireless Revolution
Software-defined radio: The Wireless Revolution
 
Information gath
Information gathInformation gath
Information gath
 
backdooring workshop
backdooring workshopbackdooring workshop
backdooring workshop
 

Similaire à Bringing SDR to the pentest community - BlackHat USA 2014

Building and Scaling Internet of Things Applications with Vortex Cloud
Building and Scaling Internet of Things Applications with Vortex CloudBuilding and Scaling Internet of Things Applications with Vortex Cloud
Building and Scaling Internet of Things Applications with Vortex CloudADLINK Technology IoT
 
Building and Scaling Internet of Things Applications with Vortex Cloud
Building and Scaling Internet of Things Applications with Vortex CloudBuilding and Scaling Internet of Things Applications with Vortex Cloud
Building and Scaling Internet of Things Applications with Vortex CloudAngelo Corsaro
 
Laser navigation 2016 technology overview short final
Laser navigation 2016 technology overview short finalLaser navigation 2016 technology overview short final
Laser navigation 2016 technology overview short finalRoberto Navoni
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security ArchitectureCisco Canada
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?Zoltan Balazs
 
OW2con'14 - Weblab in the land of Big Data
OW2con'14 - Weblab in the land of Big DataOW2con'14 - Weblab in the land of Big Data
OW2con'14 - Weblab in the land of Big DataOW2
 
#8 SUSB Expo 2014 EYE Remote Solutions
#8 SUSB Expo 2014 EYE Remote Solutions#8 SUSB Expo 2014 EYE Remote Solutions
#8 SUSB Expo 2014 EYE Remote SolutionssUAS News
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Zoltan Balazs
 
Using OpenContrail with Kubernetes
Using OpenContrail with KubernetesUsing OpenContrail with Kubernetes
Using OpenContrail with KubernetesMatt Baldwin
 
UK Spectrum Policy Forum - Daniela Genta, Airbus Group - Earth Observation an...
UK Spectrum Policy Forum - Daniela Genta, Airbus Group - Earth Observation an...UK Spectrum Policy Forum - Daniela Genta, Airbus Group - Earth Observation an...
UK Spectrum Policy Forum - Daniela Genta, Airbus Group - Earth Observation an...techUK
 
Druid at Strata Conf NY 2016.pdf
Druid at Strata Conf NY 2016.pdfDruid at Strata Conf NY 2016.pdf
Druid at Strata Conf NY 2016.pdfHimanshuGupta936
 
Global-WAN - The Swiss Neutral Data Haven
Global-WAN - The Swiss Neutral Data HavenGlobal-WAN - The Swiss Neutral Data Haven
Global-WAN - The Swiss Neutral Data HavenTWD Industries AG
 
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...CODE BLUE
 
slide_rftrack_22082015
slide_rftrack_22082015slide_rftrack_22082015
slide_rftrack_22082015Marco Rainone
 
How changing mobile and media technologies is changing the way we create inno...
How changing mobile and media technologies is changing the way we create inno...How changing mobile and media technologies is changing the way we create inno...
How changing mobile and media technologies is changing the way we create inno...Osaka University
 
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam tests
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam testsSecurity PWNing 2018 - Penthertz: The use of radio attacks during redteam tests
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam tests📡 Sebastien Dudek
 

Similaire à Bringing SDR to the pentest community - BlackHat USA 2014 (20)

Connecting Syria's Refugees
Connecting Syria's RefugeesConnecting Syria's Refugees
Connecting Syria's Refugees
 
Building and Scaling Internet of Things Applications with Vortex Cloud
Building and Scaling Internet of Things Applications with Vortex CloudBuilding and Scaling Internet of Things Applications with Vortex Cloud
Building and Scaling Internet of Things Applications with Vortex Cloud
 
Building and Scaling Internet of Things Applications with Vortex Cloud
Building and Scaling Internet of Things Applications with Vortex CloudBuilding and Scaling Internet of Things Applications with Vortex Cloud
Building and Scaling Internet of Things Applications with Vortex Cloud
 
Laser navigation 2016 technology overview short final
Laser navigation 2016 technology overview short finalLaser navigation 2016 technology overview short final
Laser navigation 2016 technology overview short final
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security Architecture
 
r34600_184_ppt_geo_business_presentation_eng
r34600_184_ppt_geo_business_presentation_engr34600_184_ppt_geo_business_presentation_eng
r34600_184_ppt_geo_business_presentation_eng
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
 
OW2con'14 - Weblab in the land of Big Data
OW2con'14 - Weblab in the land of Big DataOW2con'14 - Weblab in the land of Big Data
OW2con'14 - Weblab in the land of Big Data
 
#8 SUSB Expo 2014 EYE Remote Solutions
#8 SUSB Expo 2014 EYE Remote Solutions#8 SUSB Expo 2014 EYE Remote Solutions
#8 SUSB Expo 2014 EYE Remote Solutions
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
 
Using OpenContrail with Kubernetes
Using OpenContrail with KubernetesUsing OpenContrail with Kubernetes
Using OpenContrail with Kubernetes
 
UK Spectrum Policy Forum - Daniela Genta, Airbus Group - Earth Observation an...
UK Spectrum Policy Forum - Daniela Genta, Airbus Group - Earth Observation an...UK Spectrum Policy Forum - Daniela Genta, Airbus Group - Earth Observation an...
UK Spectrum Policy Forum - Daniela Genta, Airbus Group - Earth Observation an...
 
Druid at Strata Conf NY 2016.pdf
Druid at Strata Conf NY 2016.pdfDruid at Strata Conf NY 2016.pdf
Druid at Strata Conf NY 2016.pdf
 
Global-WAN - The Swiss Neutral Data Haven
Global-WAN - The Swiss Neutral Data HavenGlobal-WAN - The Swiss Neutral Data Haven
Global-WAN - The Swiss Neutral Data Haven
 
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
 
slide_rftrack_22082015
slide_rftrack_22082015slide_rftrack_22082015
slide_rftrack_22082015
 
URVI Research Labs - Flyer
URVI Research Labs - FlyerURVI Research Labs - Flyer
URVI Research Labs - Flyer
 
How changing mobile and media technologies is changing the way we create inno...
How changing mobile and media technologies is changing the way we create inno...How changing mobile and media technologies is changing the way we create inno...
How changing mobile and media technologies is changing the way we create inno...
 
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam tests
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam testsSecurity PWNing 2018 - Penthertz: The use of radio attacks during redteam tests
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam tests
 
Leandro Agrò
Leandro AgròLeandro Agrò
Leandro Agrò
 

Dernier

Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....ShaimaaMohamedGalal
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 

Dernier (20)

Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 

Bringing SDR to the pentest community - BlackHat USA 2014