A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Stealthy and Persistent Back Door for Z-Wave Gateways - Jonathan Fuller Ben Ramsey Derbycon 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)

Stealthy and Persistent Back Door for Z-Wave Gateways
Jonathan Fuller Ben Ramsey
Derbycon 2015

Z-Wave is a proprietary wireless protocol that is gaining market share in home automation and security systems. However, very little work has been done to investigate the security implications of these sub-GHz devices. In this talk we review recent work on hacking Z-Wave networks, and introduce a new attack that creates a persistent back door. This attack maintains a stealthy, parallel, and persistent control channel with all Z-Wave devices in the home. We will demonstrate the attack against a commercial Z-Wave security system.

Jonathan Fuller is a network engineer with interests in vulnerability analysis and exploitation. Ben Ramsey has spent over a decade making and breaking wireless networks. His favorite targets are VoIP phones and home automation systems.

Back to Derbycon 2015 video list

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast