Hi
user
Admin Login:
Username:
Password:
Name:
Network Protocol Analysis for IoT Devices
--client
lca
--show
lca2017
--room plenary 12074 --force
Next: 12 Optimizing a new processor architecture
show more...
Marks
Author(s):
Jonathan Oxer
Location
Plenary Hall
Date
jan Wed 18
Days Raw Files
Start
18:35
First Raw Start
18:05
Duration
0:45:0
Offset
0:29:56
End
19:20
Last Raw End
20:05
Chapters
00:00
0:28:01
Total cuts_time
44 min.
http://linux.conf.au/schedule/presentation/21/
raw-playlist
raw-mp4-playlist
encoded-files-playlist
host
archive
tweet
mp4
svg
png
assets
release.pdf
Network_Protocol_Analysis_for_IoT_Devices.json
logs
Admin:
episode
episode list
cut list
raw files day
marks day
marks day
image_files
State:
---------
borked
edit
encode
push to queue
post
richard
review 1
email
review 2
make public
tweet
to-miror
conf
done
Locked:
clear this to unlock
Locked by:
user/process that locked.
Start:
initially scheduled time from master, adjusted to match reality
Duration:
length in hh:mm:ss
Name:
Video Title (shows in video search results)
Emails:
email(s) of the presenter(s)
Released:
Unknown
Yes
No
has someone authorised pubication
Normalise:
Channelcopy:
m=mono, 01=copy left to right, 10=right to left, 00=ignore.
Thumbnail:
filename.png
Description:
Learn about practical network protocol analysis techniques, and take control of the devices that surround you! Our homes are filled with devices that communicate over both wired and wireless networks, pushing data to each other to make our lives easier. Many of these devices started out as simple 2-node pairs: some kind of sensor in one place, and a display in another. The sensor is installed in a useful location and periodically communicates with the display that is sitting on your kitchen counter, and your life is improved somehow. Think of home weather stations, HVAC thermostats, and power usage monitors as common examples. These devices are designed to be cheap, simple, and reliable. What they are NOT designed to be is secure. They commonly blast their data out using transmitters operating in the unlicensed ISM (Industrial, Scientific, Medical) bands without any regard for whether third parties can intercept that data. Now stop to think about how many other devices in your house may be using wireless communication. Security cameras, bathroom scales, motion detectors, water tank sensors, car alarms, remote control power strips, flood detection alarms, door locks, electric curtains and blinds, humidity sensors, heart rate sensors. And yes, as Karen Sandler showed us at a previous LCA, even implanted medical devices such as pacemakers! This provides us with both opportunities and threats. The opportunity is to make these devices do far more than their maker intended. Many of them were designed to be nothing more than point-to-point systems, but by using some basic tools such as an Arduino we can eavesdrop on their conversations and even imitate them. This talk will demonstrate how to start with an unknown communications method between a pair of devices, and methodically pick it apart until we can see how it works. It will begin with a simple ultrasonic water tank depth sensor that sends a periodic signal to a display in your house, and show how to intercept the signal for your own purposes such as integrating it with a home automation system. Which leads us to the threat. Having analysed the network protocol so that we can read it, we can now also spoof that same protocol to inject false data into the system. With the same skills and tools required to intercept common ISM band signals, we can simply pull up in a car outside a house and cause havoc by manipulating the trivial wireless data packets flying around it. Finally, learn which techniques you can use with your own IoT projects to reduce the risk of becoming a victim yourself.
markdown
Comment:
production notes
2017-01-19/11_05_04.ts
Apply:
18:05:04 - 18:28:21 ( 00:23:17 )
S:
18:05:04 -
E:
18:35:04
D:
00:30:00
(
End:
1397.0)
show more...
vlc ~/Videos/veyepar/lca/lca2017/dv/plenary/2017-01-19/11_05_04.ts :start-time=00.0 --audio-desync=0
Raw File
Cut List
18:05:04
seconds: 0.0
Wall: 18:05:04
Duration
00:30:00
18:35:04
seconds: 1397.0
Wall: 18:28:21
Comments:
mp4
mp4.m3u
dv.m3u
Split:
Sequence:
:
delete
2017-01-19/11_05_04.ts
Apply:
18:28:21 - 18:35:04 ( 00:06:43 )
S:
18:05:04 -
E:
18:35:04
D:
00:30:00
(
Start:
1397.0)
show more...
vlc ~/Videos/veyepar/lca/lca2017/dv/plenary/2017-01-19/11_05_04.ts :start-time=01397.0 --audio-desync=0
Raw File
Cut List
18:05:04
seconds: 1397.0
Wall: 18:28:21
Duration
00:30:00
18:35:04
seconds: 0.0
Wall: 18:05:04
Comments:
mp4
mp4.m3u
dv.m3u
Split:
Sequence:
:
delete
2017-01-19/11_35_04.ts
Apply:
18:35:04 - 18:37:02 ( 00:01:58 )
S:
18:35:04 -
E:
19:05:03
D:
00:29:59
(
End:
118.0)
show more...
vlc ~/Videos/veyepar/lca/lca2017/dv/plenary/2017-01-19/11_35_04.ts :start-time=00.0 --audio-desync=0
Raw File
Cut List
18:35:04
seconds: 0.0
Wall: 18:35:04
Duration
00:29:59
19:05:03
seconds: 118.0
Wall: 18:37:02
Comments:
mp4
mp4.m3u
dv.m3u
Split:
Sequence:
:
delete
2017-01-19/11_35_04.ts
Apply:
18:37:02 - 19:05:03 ( 00:28:01 )
S:
18:35:04 -
E:
19:05:03
D:
00:29:59
(
Start:
118.0)
show more...
vlc ~/Videos/veyepar/lca/lca2017/dv/plenary/2017-01-19/11_35_04.ts :start-time=0118.0 --audio-desync=0
Raw File
Cut List
18:35:04
seconds: 118.0
Wall: 18:37:02
Duration
00:29:59
19:05:03
seconds: 0.0
Wall: 18:35:04
Comments:
mp4
mp4.m3u
dv.m3u
Split:
Sequence:
:
delete
2017-01-19/12_05_04.ts
Apply:
19:05:04 - 19:21:51 ( 00:16:47 )
S:
19:05:04 -
E:
19:06:49
D:
00:01:45
(
End:
16:47)
show more...
vlc ~/Videos/veyepar/lca/lca2017/dv/plenary/2017-01-19/12_05_04.ts :start-time=00.0 --audio-desync=0
Raw File
Cut List
19:05:04
seconds: 0.0
Wall: 19:05:04
Duration
00:01:45
19:06:49
seconds: 1007.0
Wall: 19:21:51
Comments:
mp4
mp4.m3u
dv.m3u
Split:
Sequence:
:
delete
2017-01-19/12_35_04.ts
Apply:
19:35:04 - 20:05:03 ( 00:29:59 )
S:
19:35:04 -
E:
20:05:03
D:
00:29:59
show more...
vlc ~/Videos/veyepar/lca/lca2017/dv/plenary/2017-01-19/12_35_04.ts :start-time=00.0 --audio-desync=0
Raw File
Cut List
19:35:04
seconds: 0.0
Wall: 19:35:04
Duration
00:29:59
20:05:03
seconds: 0.0
Wall: 19:35:04
Comments:
mp4
mp4.m3u
dv.m3u
Split:
Sequence:
:
delete
Rf filename:
root is .../show/dv/location/, example: 2013-03-13/13:13:30.dv
Sequence:
get this:
check and save to add this
2017-01-19/11_05_04.ts
2017-01-19/11_35_04.ts
2017-01-19/12_05_04.ts
2017-01-19/12_35_04.ts
Veyepar
Video Eyeball Processor and Review