Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Hacking Invisibly and Silently with Light and Sound

BruCON Security Conference via YouTube

Overview

This course teaches techniques and attacks that leverage light and sound for C2 channels, exfiltration, surveillance, and exploitation. The learning outcomes include understanding how to use off-the-shelf hardware for various purposes such as disabling motion detectors, jamming speech, and more. The course aims to provide attendees with new methodologies to consider when targeting well-defended networks and environments. The teaching method involves practical demonstrations, case studies, and discussions on mitigation strategies. The intended audience includes cybersecurity professionals, ethical hackers, and individuals interested in advanced hacking techniques.

Syllabus

Introduction
Outline
Disclaimers
Lifefire
Air Gaps
Previous research
Ambient light sensors
Could an attack a crate malware
Proof of concept
Exfiltration
Example
Dreddphone
Demo
Spectrogram
Mitigation
Laser microphones
Sniffing infrared signals
Playing back infrared signals
Infrared motion detectors
Phone to Doorbell
Active Infrared Motion Detector
Delayed Auditory Feedback
Delayed Sidetone
Gilmore Gilmore
Upshot
Astro Drones
Autonomous Vehicles
Drone repellant
Summary
Pros Cons
Mitigations
Future research
References

Taught by

BruCON Security Conference

Reviews

Start your review of Hacking Invisibly and Silently with Light and Sound

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.