A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


ApiMote: a tool for speaking 802.15.4 dialects and frame injection - Ryan Speers & Sergey Bratus (Defcon Wireless Village 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)

ApiMote: a tool for speaking 802.15.4 dialects and frame injection - Ryan Speers & Sergey Bratus

The Api-Mote is a commodity chip-based device designed specifically for low-level interaction with the IEEE 802.15.4/Zigbee PHY. It supports injection of raw 802.15.4 frames, including those with custom preambles and start-of-frame-delimiters (by using the packet-in-packet trick). It works with the KillerBee framework and Api-do 802.15.4 tools (http://code.google.com/p/zigbee-security/wiki/ApiMote_Overview). It's built on top of a GoodFET, and so it's easy to interact with in your favorite scripting language, over USB. We used the tool to develop tricks for cheap PHY-level fingerprinting of 802.15.4 receivers by sending various non-standard frames; in doing so, we found we could send frames that only certain vendor chips would reliably hear. Our methods can be used for testing WIDS bypasses or for targeted "under-the-radar" attacks on specific vendor's chips, and similar low-level research and assessment.

Bio: Ryan Speers is a co-founder and security researcher at River Loop Security and has extensive experience in IEEE 802.15.4/ZigBee analysis and software and hardware security analysis. He maintains the KillerBee 802.15.4 framework.

Sergey Bratus is a Research Associate Professor at Dartmouth College. He enjoys finding weird properties of common programming models and protocols.

Back to Defcon Wireless Village 2014 (Defcon 22) video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast