• ClipSaver
  • dtub.ru
ClipSaver
Русские видео
  • Смешные видео
  • Приколы
  • Обзоры
  • Новости
  • Тесты
  • Спорт
  • Любовь
  • Музыка
  • Разное
Сейчас в тренде
  • Фейгин лайф
  • Три кота
  • Самвел адамян
  • А4 ютуб
  • скачать бит
  • гитара с нуля
Иностранные видео
  • Funny Babies
  • Funny Sports
  • Funny Animals
  • Funny Pranks
  • Funny Magic
  • Funny Vines
  • Funny Virals
  • Funny K-Pop

Hacking the Airwaves: Beyond Relay Attacks! - Robin Roodt скачать в хорошем качестве

Hacking the Airwaves: Beyond Relay Attacks! - Robin Roodt 8 месяцев назад

скачать видео

скачать mp3

скачать mp4

поделиться

телефон с камерой

телефон с видео

бесплатно

загрузить,

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Hacking the Airwaves: Beyond Relay Attacks! - Robin Roodt
  • Поделиться ВК
  • Поделиться в ОК
  •  
  •  


Скачать видео с ютуб по ссылке или смотреть без блокировок на сайте: Hacking the Airwaves: Beyond Relay Attacks! - Robin Roodt в качестве 4k

У нас вы можете посмотреть бесплатно Hacking the Airwaves: Beyond Relay Attacks! - Robin Roodt или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:

  • Информация по загрузке:

Скачать mp3 с ютуба отдельным файлом. Бесплатный рингтон Hacking the Airwaves: Beyond Relay Attacks! - Robin Roodt в формате MP3:


Если кнопки скачивания не загрузились НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу страницы.
Спасибо за использование сервиса ClipSaver.ru



Hacking the Airwaves: Beyond Relay Attacks! - Robin Roodt

This talk will dive into the fundamental concepts of the radio frequency (RF) Relay attack and how it could be used to attack different type of systems that make use of radio communication. The Relay Attack allows an attacker to extend the intended range of communication between two devices, deceiving them into believing that they are in close proximity to one another to perform some type sensitive action, such as unlocking or starting cars, or making payments with PoS devices! Introduction: An introduction of the talk and the topics that are going to be covered. A quick glance into my background and how I got interested in radio frequency hacking. Explaining that the talk is mostly going to be focused diving into the fundamental concepts of the Relay attack and then two demonstrations as to how it could be used to target two completely different systems, namely cars and PoS devices. Concept of Relay Attack: This section is going to go through a conceptual explanation of what the relay attack is and how it is used to extend the intended range of communication between two devices, deceiving them into believing that they are in close proximity to one another to perform some sensitive action. Using the Relay attack to unlock and start cars: This section will explain how the Relay attack could be used to target automotive keyless entry and keyless start systems on cars. This will include a brief explanation of how keyless entry and keyless start systems work, with security footage showing how criminals execute the attack to steal a victim's car while the key remains locked inside the house (Demo 1). How far could you relay signals? Now that we understand the fundamentals of the Relay attack, we are going to perform the same attack, but in a different way to illustrate that this attack can be performed over great distances. We are going to attempt to relay signals from Cape Town all the way to Pretoria to unlock a car. An explanation will be given of how the signals are relayed from Cape Town to Pretoria, which will follow a demonstration of the actual proof-of-concept. In-case the proof of concept doesn't work due to the demo gods, we are going to show a video of the PoC working between Johannesburg and Pretoria. (Demo 2) How does this work on other systems such as a PoS device? After going through the automotive security explanation, what would this look like on a different device such as a PoS device? This section will give an explanation of how the attack would work when targeting a PoS device's tap-to-pay to make payments over larger distances. The explanation, followed by a demonstration (Demo 3), is going to show that the PoS device doesn't actually have to be near the victim's credit card to make a payment. As long as the signals are correctly relayed, it could be done over any distance. Closing remarks This section will be a quick recap of the topics covered during the talk, with a final reminder that this attack could be executed on anything that makes use of radio signals, such as access control system as well. A final note that I hope this talk has brought some insights to radio frequency hacking and raised some security awareness around the topic. Takeaways Security awareness about the Relay attack and how it could be used on any device that makes use of radio communication. ======================================== About the speaker: Robin Roodt I'm a cyber security consultant at MWR CyberSec where my main focus is Application Security. I started looking at radio signals in University where I got a lot of exposure while studying BEng Computer Engineering. Taking that knowledge to a security company, I thought to myself "What happens when we hack these signals flying through the air?". That kick-started my hobby where I immediately started hacking my mom's car! ========================================

Comments
  • I Hacked Into My Own Car 5 лет назад
    I Hacked Into My Own Car
    Опубликовано: 5 лет назад
  • Long Range RFID Tracking 4 года назад
    Long Range RFID Tracking
    Опубликовано: 4 года назад
  • ШИФРОВАНИЕ ПОЛИЦЕЙСКОГО СКАНЕРА — ОТСТОЙ! 7 лет назад
    ШИФРОВАНИЕ ПОЛИЦЕЙСКОГО СКАНЕРА — ОТСТОЙ!
    Опубликовано: 7 лет назад
  • How to Bypass RFID Badge Readers (w/ Deviant Ollam and Babak Javadi) 5 лет назад
    How to Bypass RFID Badge Readers (w/ Deviant Ollam and Babak Javadi)
    Опубликовано: 5 лет назад
  • Извлечение прошивки китайской IP-камеры — основы пентестинга в Интернете вещей 1 месяц назад
    Извлечение прошивки китайской IP-камеры — основы пентестинга в Интернете вещей
    Опубликовано: 1 месяц назад
  • This Toy Can Open Any Garage 7 лет назад
    This Toy Can Open Any Garage
    Опубликовано: 7 лет назад
  • Самое крутое радио, о котором вы, вероятно, никогда не слышали 4 года назад
    Самое крутое радио, о котором вы, вероятно, никогда не слышали
    Опубликовано: 4 года назад
  • Ignorantia Juris Non Excusat - Understanding the Impact of the Law on the SA Hacker Community 9 месяцев назад
    Ignorantia Juris Non Excusat - Understanding the Impact of the Law on the SA Hacker Community
    Опубликовано: 9 месяцев назад
  • Принц Персии: разбираем код гениальной игры, вытирая слезы счастья 2 недели назад
    Принц Персии: разбираем код гениальной игры, вытирая слезы счастья
    Опубликовано: 2 недели назад
  • Attacking Pipelines: Large Scale Exploitation of Workflow Files - David, Rohan & Andrei 8 месяцев назад
    Attacking Pipelines: Large Scale Exploitation of Workflow Files - David, Rohan & Andrei
    Опубликовано: 8 месяцев назад
  • Я попытался совершить невозможное восхождение на холм. 10 дней назад
    Я попытался совершить невозможное восхождение на холм.
    Опубликовано: 10 дней назад
  • Unmasking the Digital Shadows: OSINT Techniques for Cybersecurity Professionals - Sharon Knowles 8 месяцев назад
    Unmasking the Digital Shadows: OSINT Techniques for Cybersecurity Professionals - Sharon Knowles
    Опубликовано: 8 месяцев назад
  • Why 2.6 Million People Can Push This Button But We Can't 6 лет назад
    Why 2.6 Million People Can Push This Button But We Can't
    Опубликовано: 6 лет назад
  • Defcon 21 - The Secret Life of SIM Cards 12 лет назад
    Defcon 21 - The Secret Life of SIM Cards
    Опубликовано: 12 лет назад
  • Mike Pound Q&A - Computerphile 5 лет назад
    Mike Pound Q&A - Computerphile
    Опубликовано: 5 лет назад
  • Why captchas are getting harder 4 года назад
    Why captchas are getting harder
    Опубликовано: 4 года назад
  • Attacking GraphQL: A guide for penetration testers - Keith Makan 9 месяцев назад
    Attacking GraphQL: A guide for penetration testers - Keith Makan
    Опубликовано: 9 месяцев назад
  • Zen and the Art of Cognitive Defense: Zero-Trust Mindsets and Cyber-Mindfulness - Anna & Christine 9 месяцев назад
    Zen and the Art of Cognitive Defense: Zero-Trust Mindsets and Cyber-Mindfulness - Anna & Christine
    Опубликовано: 9 месяцев назад
  • Создание индивидуальной базовой станции сотовой связи 2G GSM 2 месяца назад
    Создание индивидуальной базовой станции сотовой связи 2G GSM
    Опубликовано: 2 месяца назад
  • SpeedRunners: The Hackers of the Gaming World - Nunudzai Mrewa 7 месяцев назад
    SpeedRunners: The Hackers of the Gaming World - Nunudzai Mrewa
    Опубликовано: 7 месяцев назад

Контактный email для правообладателей: [email protected] © 2017 - 2025

Отказ от ответственности - Disclaimer Правообладателям - DMCA Условия использования сайта - TOS



Карта сайта 1 Карта сайта 2 Карта сайта 3 Карта сайта 4 Карта сайта 5