(TL08) (INCYBER) Radio Spectrum Recognition and Exploitation

(TL08) (INCYBER) Radio Spectrum Recognition and Exploitation

Tuesday, April 1, 2025 2:35 PM to 3:05 PM · 30 min. (Europe/Paris)

Information

Radiofrequency (RF) interfaces play a critical role in modern technologies, enabling connectivity for a wide range of devices such as Internet of Things (IoT) objects, electric vehicles (EVs), robotic systems, and critical infrastructures. While these interfaces offer innovative and practical solutions, they also expose attack surfaces that are often overlooked or poorly understood. If exploited by malicious actors, these vulnerabilities can compromise not only the confidentiality and security of data but also the availability of critical systems.

This technical presentation aims to shed light on these risks by exploring specific vulnerabilities associated with RF communications. We will discuss methods to discover, analyze, and, in some cases, exploit these vulnerabilities for the purposes of security evaluation and reinforcement.

During this session, participants will be introduced to methodologies and tools used in SIGINT (Signal Intelligence) and COMINT (Communication Intelligence) tasks. We will highlight practical and accessible approaches, with a particular focus on leveraging minimal, low-cost equipment to intercept and analyze RF communications. Through live demonstrations, we will showcase how these tools can be applied to identify and understand critical vulnerabilities.

We will cover techniques for:

Detection and Analysis of RF Signals: Steps to intercept and analyze communications between various connected devices.
Identification of Attack Surfaces: How to locate and map potential entry points in modern systems.
Reproduction and Exploitation of Captured Communications: Practical techniques for manipulating identified RF transmissions.
Affordable Setup: Implementing an effective testing environment on a limited budget using open-source tools.
The demonstrations will reinforce theoretical concepts, highlighting real-world examples such as exploiting vulnerabilities in IoT devices or connected vehicles.
Type d'intervention
Tech Lab
Location
Tech Lab
Event
INCYBER FORUM

Join the event!

See all the content and easy-to-use features by logging in or registering!