Presented at
DEF CON 22 (2014),
Aug. 7, 2014, noon
(60 minutes).
The purpose of this talk is to discuss the effective radio frequency (RF) tools, tactics, and procedures that we recommend security professionals use when performing a repeatable RF penetration test. This talk will cover the fundamental processes used to identify the RF within the environment, identify the vulnerabilities specific to that environment, and offer attack methodology to exploit those vulnerabilities. This talk will cover the hardware and software that we recommend for users just starting out all the way from N00bz to l33t hax0rs. To provide some hands on experience with RF penetration testing, we have developed the Wireless Capture the Flag (WCTF) in the Wireless Village at DEF CON. We will provide an over view of this contest designed to test your skills, and give you a shooting range to practice and compete, and level of experience doesn’t matter, the willingness to learn will get you much further. http://WCTF.us
Presenters:
-
Rick Mellendick
- (Rick Mellendick)
as RMellendick
RMellendick builder and breaker of RF things, inventor of the WCTF, defender of good and evil depending on your perspective, spends way too much time with his head in the air, sniffing the RF. And of course his last name is still MELLENDICK. Twitter: @rmellendick
-
John Fulmer / DaKahuna
- (John Fulmer)
as DaKahuna
By day, DaKahuna supports a large government agency reviewing and criticizing network and security architectures, advising on matters related to information assurance and information security policies, standards and guidance. By night he enjoys snooping the Ether be it the amateur radio bands or his neighbors wireless networks. In his off time he can be found on the pistol or rifle range enjoying the smell of burnt gunpowder. He is a father of two, grandfather or three, a 24 year Navy veteran, holder of an amateur radio Extra Class license and a staunch supporter and exerciser of his 2nd and 4th rights.
Links:
Similar Presentations: