Reverse-engineering wireless protocols is easier than you might think. By leveraging open-source intelligence and open-source tools, we can shortcut most of the hard work, enable lazy-mode, and spend more time thinking about what we care about - "Is this thing secure?"
Reverse-engineering wireless protocols is easier than you might think. By leveraging open-source intelligence and open-source tools, we can shortcut most of the hard work, enable lazy-mode, and spend more time thinking about what we care about - "Is this thing secure?"
This talk will demonstrate how to use existing tools to efficiently reverse-engineer wireless protocols, and will introduce a new tool for gathering device OSINT from regulatory filings.
Rather than exploring the fundamentals of how RF communications work, we will take a practical look at how we can lower the complexity of the OSINT and reverse-engineering process.