Dan Veeneman Wireless Overview Protocols and Threat Models

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=HGHqxyzhM4I



Duration: 1:04:48
4 views
0


Wireless Overview: Protocols and Threat Models
Dan Veeneman
[ Wireless ]

Everything seems to be going wireless. There are now a number of wireless voice and data networks that are used routinely to carry sensitive business and personal information. This session will provide an introduction to the protocols, radio modulation techniques, and security features of CDPD, Bluetooth, digital mobile telephony (including SIM cards), SMS, 3G, two-way paging and private data networks.

We'll discuss the development of threat models and some corresponding mitigation techniques, as well as demonstrate several wireless tools and test equipment.

A question and answer session at the end of the presentation will allow participants to cover any additional issues they'd like to discuss.

Dan Veeneman has served in a number of management, technical and consulting positions since 1980. He has designed and implemented secure data networks for a number of government and civilian clients, encompassing video, audio and data delivered over telephone, satellite and the Internet. Dan is also the system architect for the United States Army's satellite-based two-way realtime messaging and geolocation system used on thousands of battlefield vehicles around the world.

Dan has been writing software for more than 25 years, coding everything from embedded firmware to distributed processing applications for a variety of small, midsize and Fortune 500 companies.

He writes a monthly magazine column covering wireless issues and edits a quarterly newsletter concerning cryptography. Dan holds an engineering degree from Northwestern University

Black Hat - USA - 2002 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #wireless




Other Videos By All Hacking Cons


2021-12-29Your Mind Legal Status, Rights and Securing Yourself Tiffany Rad & James Arlen
2021-12-29Worst of the Best of the Best Kevin Stadmeyer Black Hat - USA - 2009
2021-12-29Unraveling Unicode Chris Weber Black Hat - USA - 2009
2021-12-29Reversing and Exploiting an Apple Firmware Update K Chen
2021-12-29State of the Art Post Exploitation in Hardened PHP Environments Stefan Esser
2021-12-29Post Exploitation Bliss Loading Meterpreter on a Factory iPhone Vincenzo Iozzo, Charlie Miller
2021-12-29Ofir Arkin Introducing X Playing Tricks with ICMP
2021-12-29Jeff Nathan and Kevin Depeugh Layer 2 Attacks
2021-12-29Job de Haas GSM WAP and SMS Security
2021-12-29JD Glaser JDs Toolbox Fire and Ice
2021-12-29Dan Veeneman Wireless Overview Protocols and Threat Models
2021-12-29Panel Vulnerability Disclosure What the Feds Think
2021-12-28Welcome and Introduction to Black Hat USA 2009 Jeff Moss Black Hat - USA - 2009
2021-12-28The Language of Trust: Exploiting Trust Relationships in Active Content Mark Dowd, Ryan Smith
2021-12-28Recoverable Advanced Metering Infrastructure Mike Davis Black Hat - USA - 2009
2021-12-28Attacking SMS Zane Lackey, Luis Miras Black Hat - USA - 2009
2021-12-28Deactivate the Rootkit Alfredo Ortega Black Hat - USA - 2009
2021-12-28Is Your Phone Pwned Kevin Mahaffey, Anthony Lineberry, John Hering Black Hat - USA - 2009
2021-12-28Meet the Feds Feds vs Ex Feds Panel Black Hat - USA - 2009
2021-12-28Defensive Rewriting Bryan Sullivan Black Hat - USA - 2009
2021-12-28Automated Malware Similarity Analysis Daniel Raygoza Black Hat - USA - 2009



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
firewall
communication
business
privacy
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering
Dan Veeneman