| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
802.15.4 is the protocol underpinning Zigbee and 6lowpan, some of the major up-and-comer wireless protocols in the home automation and industrial automation space. Despite this, many lack information about how to audit 802.15.4 and what its attack surface looks like. In this talk, we'll cover the parts of the 802.15.4 spec which are ripe for abuse, hardware and software you'll need to do it, and publicly release tools for performing some 802.15.4 attacks. Crypt0s isn't great at speaking in the 3rd person, but he did once help run a hackerspace in Maryland, and enjoys coming up with creative computer security problems to solve and projects to make.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast