A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Stealthy and Persistent Back Door for Z-Wave Gateways - Jonathan Fuller Ben Ramsey Derbycon 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)

Stealthy and Persistent Back Door for Z-Wave Gateways
Jonathan Fuller Ben Ramsey
Derbycon 2015

Z-Wave is a proprietary wireless protocol that is gaining market share in home automation and security systems. However, very little work has been done to investigate the security implications of these sub-GHz devices. In this talk we review recent work on hacking Z-Wave networks, and introduce a new attack that creates a persistent back door. This attack maintains a stealthy, parallel, and persistent control channel with all Z-Wave devices in the home. We will demonstrate the attack against a commercial Z-Wave security system.

Jonathan Fuller is a network engineer with interests in vulnerability analysis and exploitation. Ben Ramsey has spent over a decade making and breaking wireless networks. His favorite targets are VoIP phones and home automation systems.

Back to Derbycon 2015 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast