On the Wings of Time: Demystifying Wireless Ethical Hacking and Defenses
Date: 14th Oct – MondayTime: 10:00-10:30Location: Ballroom A
Recent years have seen a flood of novel wireless exploits, from vulnerable medical devices to hacked OT devices, with exploitation moving beyond 802.11 and into more obscure standard and proprietary protocols. While other non-WiFi RF protocols remain a mystery to many security practitioners, exploiting them is easier than one might think. Today, cyber threats have grown not just in its depth (more sophisticated) but also in its breadth (expanded scope). It has grown from threats in Enterprise IT systems to Operation Technologies (OT) and Industrial Control Systems (ICS).
To ensure wireless security, one needs to have a comprehensive understanding of the technology, threats, exploits, and defensive techniques along with experience in evaluating and attacking wireless technology. Not limiting one’s skill-set to WiFi, we also need to evaluate the threat from other standards-based and proprietary wireless technologies as well. This session takes an in-depth look at the security challenges of many different wireless technologies, exposing one to wireless security threats through the eyes of an attacker. Using readily available and custom-developed tools, we’ll navigate our way through the techniques attackers use to exploit RF networks. The session will introduce one how to identify the threats that expose wireless technology and build on this knowledge to implement defensive techniques that can be used to protect wireless systems.