SlideShare a Scribd company logo
1 of 34
Download to read offline
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
Bringing Software Defined Radio to the
penetration testing community
Jean-Michel PICOD
Arnaud LEBRUN
Jonathan-Christofer DEMAY
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
2
More & more connected objects:
8.7 billion in 2012
12.5 billion in 2014 (100 more per second)
50 billion expected by 2020
Source: Cisco
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
3
43 million smart meters in the U.S. in 2012
Source: U.S. Energy Information Administration
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
4
DRAFT NIST IR 7628 Revision 1
Guidelines for Smart Grid Cyber Security (Vol. 3)
(p.85)
Examples of security research tools yet to be started:
Devices to easily interact with, capture, and analyze traffic of metering networks for different vendors.
Currently, the best toolset available is the software-defined radio named USRP2 from Ettus Research,
costing roughly $2k. This toolset allows for RF analysis and indeed can capture data bits. However, the ideal
toolset would allow an analyst's computer to interface to the metering networks and provide an appropriate
network stack in a popular operating system such as Linux
"
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
5
Difficulties
• Multiple radio protocols
• Multiple bands
–ISM (433 MHz, 868 MHz, 900 MHz, 2.4 GHz)
–Proprietary (e.g. wM-Bus on 169 MHz)
• Multiple modulations
• Multiple bitrates
• Multiple applicative layers
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
Existing tools
• Ubertooth (http://ubertooth.sourceforge.net) by Michael Ossmann
o Dedicated to bluetooth and BTLE
• rfCat (http://code.google.com/p/rfcat) by Atlas of d00m
o Only compatible with a subset of Chipcon based dongles
o Sub-GHz ISM band
o 2.4 GHz (dev in progress)
o Grabs raw packets ; no protocol decoding
• Apimote (http://www.riverloopsecurity.com) by Ryan M. Speers
o Targets Zigbee
30 June 2014
Bringing Software Defined Radio to the penetration testing community
6
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
7
Moore’s law to the rescue:
“ Over the history of computing hardware, the number of
transistors in a dense integrated circuit doubles approximately
every two years”
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
8
Software Defined Radio
• Configurable local oscillator ; no hardwired processing done
• From 20$ to 20,000$
• Compromise between size / performance / price is from 300$ to 1000$
• Became very popular and affordable since RTL-SDR hack
• All can listen, some can also send:
Credit: http://greatscottgadgets.com/hackrf/
Bringing Software Defined Radio to the penetration testing community
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
Introduction to GNU Radio & scapy
30 June 2014 9
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
10
GNU Radio
GNU Radio is a framework
• Click’n play GUI (GNU Radio Companion)
• gr-modtool to help extend it
• Python and C++
• Supports a lot of SDR
• Lots of great tutorials (+ Michael Ossmann’s trainings)
• Basic blocks available to do blind signal analysis inside
• And of course, it’s open source software (GPLv3)
Signal processing as a Lego® game!
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
11
Scapy
“Interactive packet manipulation program”
• Used world-wide by pentesters
• Full Python code
• Supported under Windows, Linux, Mac OSX, etc.
• Easy to extend
• Lots of protocols already supported
• Native fuzzing capabilities
• Some more high level tools available based on scapy
Bringing Software Defined Radio to the penetration testing community
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
Introducing scapy-radio
30 June 2014 12
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
13
How does it work?
SCAPY
IN socket OUT socket
GNU Radio graph (GRC)
OUT socket IN socket
Software Defined Radio
layer
layer
layer
layer
SuperSocket scapy
layer
layer
layer
layer
layer
layer
layer
layer
UDP + custom
"GNU Radio" layer
XMLRPC
control
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
Why a UDP socket?
• Natively supported in GnuRadio
• TUN/TAP requires to be root. UDP doesn’t
• Creating a custom interface did not sound a good idea
• Easy to forward (netcat, socat, etc.)
• Could be more easy to build a cluster with UDP
30 June 2014
Bringing Software Defined Radio to the penetration testing community
14
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
Gnuradio header
• Total = 8 bytes
• 7 bytes "reserved for future use"
– Channel
– RSSI
– Anything that needs a per packet use
• Protocol ID on 1 byte
– 0 = Invalid packets
– 1 = Zwave
– 2 = 802.15.4 (ZigBee, 6LoWPAN, etc.)
– 3 = Bluetooth LE
– 4 = wM-Bus
– 5 = Dash7
We are also providing helpers!
This GRC block prepends a message with the header
This one filters received packets and strips the header
30 June 2014
Bringing Software Defined Radio to the penetration testing community
15
protocol 0x00 0x00 0x00 0x00 0x00 0x00 0x00
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
16
We are releasing…
• Modified version of scapy  scapy-radio
– 802.15.4 layer + Zigbee + 6LoWPAN (taken and adapted from scapy-com)
– Bluetooth 4 LE layer (advertising)
– Zwave layer
– XBee layer
• GNU Radio flowgraphs (GRC) for Ettus USRP2 B210
– 802.15.4
– Bluetooth 4 LE
– Zwave
• Tools
– Passive Zwave discovering
– Example of Zwave automaton
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
17
Known limitations
• SDR cannot do dynamic channel hopping
– Workaround: listen wide + Xlating FIR filter
• Bandwidth limitation
– On radio side
– On computer side (USB bus)
• GNU Radio does not tell when the graph is
running
• The overall setup cannot be fast
• It won’t give you superpowers…
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
18
Disclaimer
Unless you are living in a Faraday cage, don’t
forget to check your local regulation if you
want/need to transmit!
Bringing Software Defined Radio to the penetration testing community
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
What we studied
30 June 2014 19
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
Zwave home automation devices
• Magnetic sensor
• Alarm device
• Network controller
• Opensource software on Raspberry Pi
• Based on open-zwave stack
• No support of cryptography (unfortunately)
30 June 2014 20
Bringing Software Defined Radio to the penetration testing community
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
Zwave – side findings
• If you transmit too fast, it crashes the software! • Want to reverse the firmware too?
– Zen-Sys seems to be the leader
– ZW301 ASIC (8051 core inside)
– Crappy SPI protocol
• Added support in GoodFET
– More on our blog
– http://blog.cassidiancybersecurity.com/post/2014/02/Dumping-firmware-from-ASIC
30 June 2014
Bringing Software Defined Radio to the penetration testing community
21
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
Bluetooth LE e-cigarette
• Using TI CC2540 SoC
• Firmware heavily based on TI examples 
• Difficult audit (advertising only for now)
– Poor signal (even Ubertooth lost packets)
– SDR clustering to get a wider spectrum
• Potential threats:
– Privacy issues (sniffing consumption)
– Health issues?
– Firmware corruption OTA
– Cascaded attack (hack the e-cigarette that, in
turn hacks the iPhone/Android)
30 June 2014 22
Bringing Software Defined Radio to the penetration testing community
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
XBee UART bridge
• Cheap & ready-to-use, therefore popular devices
• Custom protocol over 802.15.4
– Start of implementation of the layer in scapy
• In fact 802.15.4 is troublesome
– No way to determine your payload type
– Zigbee? 6LoWPAN? XBee?
30 June 2014 23
Bringing Software Defined Radio to the penetration testing community
Bringing Software Defined Radio to the penetration testing community
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
Roadmap
30 June 2014 24
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
25
Roadmap
• Provide functions in scapy to set/get GRC variables
• Write a Wireshark plugin to read the pcap we produce
• Leverage the header to put metadata
• Add functions to handle a cluster of (computer + SDR)
• Add/test more protocols
– wM-Bus
– Dash7
– Others…
Bringing Software Defined Radio to the penetration testing community
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
How to add a protocol in that tool
Concrete stuff starts!
30 June 2014 26
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
27
Step 1 – GNU Radio blocks
1. Choose a protocol ID for the GnuRadio protocol header
2. Build your graph as usual in GRC to receive
3. Create a custom “packet sink” (state automaton)
• Checks for access code
• Converts the bitstream into a frame
• Removes invalid frames (invalid CRC)
• Prepends the “GNU Radio” header (or use the helper)
4. Test it
5. Invert the graph to transmit
6. Create a custom “preamble” block
• Prepends preamble bytes
• Adds couples of null bytes at the end (important)
7. Test it again
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
28
Step 2 – scapy layer
1. Write your required layer(s)
• Beware of pre_dissect() / post_build()
• Don’t forget hashret() and answers() when possible
2. Test it
3. Done!
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
29
Step 3 – Tie GRC and scapy layer together
1. Put the GRC file in $HOME/.scapy/radio
DO NOT change the default GRC ID variable!
2. Edit scapy/layer/gnuradio.py
• Bind GnuradioPacket and your layer
3. [optional] Edit scapy/module/gnuradio.py
• Add your layer name in the list
4. Update the install of scapy
5. Send us a pull-request for your contributions! 
Bringing Software Defined Radio to the penetration testing community
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
Demonstration
30 June 2014 30
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
31
Demo – Zwave
scapy-radio
Attacker sideHome automation side
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
30 June 2014
Bringing Software Defined Radio to the penetration testing community
32
Demo – Zwave automaton
Inits the automaton, loads
Zwave GRC
Wait for a packet…
If the packet matches, go
to WAITING state
If the transition issued a
raise, modify the packet
and send it back…
…but not too fast, remember!
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
Where to get this?
• Requirements:
• GNU Radio 3.7
• A compatible SDR
• Already provided in Kali or SamuraiSTFU
• Get the code from our repository:
• hg clone http://bitbucket.cassidiancybersecurity.com/scapy-radio
• cd scapy-radio
• ./install.sh
30 June 2014
Bringing Software Defined Radio to the penetration testing community
33
Bringing Software Defined Radio to the penetration testing community
©2014AirbusDefenceandSpace–Allrightsreserved.Thereproduction,distributionandutilizationofthisdocumentaswellasthecommunicationofitscontentstootherswithoutexpressauthorizationis
prohibited.Offenderswillbeheldliableforthepaymentofdamages.Allrightsreservedintheeventofthegrantofapatent,utilitymodelordesign.
Thank you for your attention.
Questions?
30 June 2014 34

More Related Content

Viewers also liked

Viewers also liked (20)

PTES: PenTest Execution Standard
PTES: PenTest Execution StandardPTES: PenTest Execution Standard
PTES: PenTest Execution Standard
 
Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malwareMobile hacking, pentest, and malware
Mobile hacking, pentest, and malware
 
Pentest with Metasploit
Pentest with MetasploitPentest with Metasploit
Pentest with Metasploit
 
iOS Hacking: Advanced Pentest & Forensic Techniques
iOS Hacking: Advanced Pentest & Forensic TechniquesiOS Hacking: Advanced Pentest & Forensic Techniques
iOS Hacking: Advanced Pentest & Forensic Techniques
 
Universal software defined radio development platform
Universal software defined radio development platformUniversal software defined radio development platform
Universal software defined radio development platform
 
Software Defined Radio Engineering course sampler
Software Defined Radio Engineering course samplerSoftware Defined Radio Engineering course sampler
Software Defined Radio Engineering course sampler
 
eMAPT
eMAPTeMAPT
eMAPT
 
webhacking
webhackingwebhacking
webhacking
 
PRLSAMP PP Presentation
PRLSAMP PP PresentationPRLSAMP PP Presentation
PRLSAMP PP Presentation
 
Playin with Password
Playin with PasswordPlayin with Password
Playin with Password
 
Exploit Development with Python
Exploit Development with PythonExploit Development with Python
Exploit Development with Python
 
Software Defined Radio
Software Defined RadioSoftware Defined Radio
Software Defined Radio
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Penetrasi Jaringan
Penetrasi JaringanPenetrasi Jaringan
Penetrasi Jaringan
 
IPTV Security
IPTV SecurityIPTV Security
IPTV Security
 
Social Network Security & Backdooring email
Social Network Security & Backdooring emailSocial Network Security & Backdooring email
Social Network Security & Backdooring email
 
iCrOSS 2013_Pentest
iCrOSS 2013_PentestiCrOSS 2013_Pentest
iCrOSS 2013_Pentest
 
Software-defined radio: The Wireless Revolution
Software-defined radio: The Wireless RevolutionSoftware-defined radio: The Wireless Revolution
Software-defined radio: The Wireless Revolution
 
Information gath
Information gathInformation gath
Information gath
 
backdooring workshop
backdooring workshopbackdooring workshop
backdooring workshop
 

Similar to Bringing SDR to the pentest community - BlackHat USA 2014

Building and Scaling Internet of Things Applications with Vortex Cloud
Building and Scaling Internet of Things Applications with Vortex CloudBuilding and Scaling Internet of Things Applications with Vortex Cloud
Building and Scaling Internet of Things Applications with Vortex CloudADLINK Technology IoT
 
Building and Scaling Internet of Things Applications with Vortex Cloud
Building and Scaling Internet of Things Applications with Vortex CloudBuilding and Scaling Internet of Things Applications with Vortex Cloud
Building and Scaling Internet of Things Applications with Vortex CloudAngelo Corsaro
 
Laser navigation 2016 technology overview short final
Laser navigation 2016 technology overview short finalLaser navigation 2016 technology overview short final
Laser navigation 2016 technology overview short finalRoberto Navoni
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security ArchitectureCisco Canada
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?Zoltan Balazs
 
OW2con'14 - Weblab in the land of Big Data
OW2con'14 - Weblab in the land of Big DataOW2con'14 - Weblab in the land of Big Data
OW2con'14 - Weblab in the land of Big DataOW2
 
#8 SUSB Expo 2014 EYE Remote Solutions
#8 SUSB Expo 2014 EYE Remote Solutions#8 SUSB Expo 2014 EYE Remote Solutions
#8 SUSB Expo 2014 EYE Remote SolutionssUAS News
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Zoltan Balazs
 
Using OpenContrail with Kubernetes
Using OpenContrail with KubernetesUsing OpenContrail with Kubernetes
Using OpenContrail with KubernetesMatt Baldwin
 
UK Spectrum Policy Forum - Daniela Genta, Airbus Group - Earth Observation an...
UK Spectrum Policy Forum - Daniela Genta, Airbus Group - Earth Observation an...UK Spectrum Policy Forum - Daniela Genta, Airbus Group - Earth Observation an...
UK Spectrum Policy Forum - Daniela Genta, Airbus Group - Earth Observation an...techUK
 
Druid at Strata Conf NY 2016.pdf
Druid at Strata Conf NY 2016.pdfDruid at Strata Conf NY 2016.pdf
Druid at Strata Conf NY 2016.pdfHimanshuGupta936
 
Global-WAN - The Swiss Neutral Data Haven
Global-WAN - The Swiss Neutral Data HavenGlobal-WAN - The Swiss Neutral Data Haven
Global-WAN - The Swiss Neutral Data HavenTWD Industries AG
 
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...CODE BLUE
 
slide_rftrack_22082015
slide_rftrack_22082015slide_rftrack_22082015
slide_rftrack_22082015Marco Rainone
 
How changing mobile and media technologies is changing the way we create inno...
How changing mobile and media technologies is changing the way we create inno...How changing mobile and media technologies is changing the way we create inno...
How changing mobile and media technologies is changing the way we create inno...Osaka University
 
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam tests
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam testsSecurity PWNing 2018 - Penthertz: The use of radio attacks during redteam tests
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam tests📡 Sebastien Dudek
 

Similar to Bringing SDR to the pentest community - BlackHat USA 2014 (20)

Connecting Syria's Refugees
Connecting Syria's RefugeesConnecting Syria's Refugees
Connecting Syria's Refugees
 
Building and Scaling Internet of Things Applications with Vortex Cloud
Building and Scaling Internet of Things Applications with Vortex CloudBuilding and Scaling Internet of Things Applications with Vortex Cloud
Building and Scaling Internet of Things Applications with Vortex Cloud
 
Building and Scaling Internet of Things Applications with Vortex Cloud
Building and Scaling Internet of Things Applications with Vortex CloudBuilding and Scaling Internet of Things Applications with Vortex Cloud
Building and Scaling Internet of Things Applications with Vortex Cloud
 
Laser navigation 2016 technology overview short final
Laser navigation 2016 technology overview short finalLaser navigation 2016 technology overview short final
Laser navigation 2016 technology overview short final
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security Architecture
 
r34600_184_ppt_geo_business_presentation_eng
r34600_184_ppt_geo_business_presentation_engr34600_184_ppt_geo_business_presentation_eng
r34600_184_ppt_geo_business_presentation_eng
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
 
OW2con'14 - Weblab in the land of Big Data
OW2con'14 - Weblab in the land of Big DataOW2con'14 - Weblab in the land of Big Data
OW2con'14 - Weblab in the land of Big Data
 
#8 SUSB Expo 2014 EYE Remote Solutions
#8 SUSB Expo 2014 EYE Remote Solutions#8 SUSB Expo 2014 EYE Remote Solutions
#8 SUSB Expo 2014 EYE Remote Solutions
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
 
Using OpenContrail with Kubernetes
Using OpenContrail with KubernetesUsing OpenContrail with Kubernetes
Using OpenContrail with Kubernetes
 
UK Spectrum Policy Forum - Daniela Genta, Airbus Group - Earth Observation an...
UK Spectrum Policy Forum - Daniela Genta, Airbus Group - Earth Observation an...UK Spectrum Policy Forum - Daniela Genta, Airbus Group - Earth Observation an...
UK Spectrum Policy Forum - Daniela Genta, Airbus Group - Earth Observation an...
 
Druid at Strata Conf NY 2016.pdf
Druid at Strata Conf NY 2016.pdfDruid at Strata Conf NY 2016.pdf
Druid at Strata Conf NY 2016.pdf
 
Global-WAN - The Swiss Neutral Data Haven
Global-WAN - The Swiss Neutral Data HavenGlobal-WAN - The Swiss Neutral Data Haven
Global-WAN - The Swiss Neutral Data Haven
 
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
 
slide_rftrack_22082015
slide_rftrack_22082015slide_rftrack_22082015
slide_rftrack_22082015
 
URVI Research Labs - Flyer
URVI Research Labs - FlyerURVI Research Labs - Flyer
URVI Research Labs - Flyer
 
How changing mobile and media technologies is changing the way we create inno...
How changing mobile and media technologies is changing the way we create inno...How changing mobile and media technologies is changing the way we create inno...
How changing mobile and media technologies is changing the way we create inno...
 
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam tests
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam testsSecurity PWNing 2018 - Penthertz: The use of radio attacks during redteam tests
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam tests
 
Leandro Agrò
Leandro AgròLeandro Agrò
Leandro Agrò
 

Recently uploaded

Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Best Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdfBest Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdfIdiosysTechnologies1
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noidabntitsolutionsrishis
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 

Recently uploaded (20)

Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Best Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdfBest Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdf
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 

Bringing SDR to the pentest community - BlackHat USA 2014