Exploiting ZigBee and the Internet of Things

Presented at HOPE Number Nine (2012), July 13, 2012, 8 p.m. (60 minutes)

Now that ZigBee is finally appearing in the wild, Travis will take a look back at all the nifty ways of exploiting it. (ZigBee is a low cost, low power, wireless mesh network standard.) This fast-paced lecture features as many practical, real-world exploits as can fit in the time slot. Learn how to extract firmware from a locked Freescale MC13224 by grounding pin 133, how to extract keys from a Chipcon CC2530 by erasing it first, and how to hijack control of other radios with a few hypodermic syringes. You’ll also learn how Certicom’s proprietary crypto library caused multiple ZigBee Smart Energy Profile stacks to remotely expose private ECC keys and why none of this matters because cleartext traffic is easily found in most major cities.


Presenters:

  • Travis Goodspeed
    Travis Goodspeed designed the hardware for The Next HOPE badge, as well as an exploit for Microsoft keyboards that runs on the badge. He attends far too many conferences and is alleged to have used a SCADA exploit to produce an abundance of neighborliness in Mister Rogers’ Neighborhood. Bitcoin will break if his name or Ben Bernanke’s is removed from blk0001.dat.

Links:

Similar Presentations: