Open Research Institute / DEFCON 30 Projects and Presentations

Add meeting Rate page Subscribe

Open Research Institute / DEFCON 30 Projects and Presentations

These are all the meetings we have in "DEFCON 30 Projects a…" (part of the organization "Open Research Institute"). Click into individual meeting pages to watch the recording and search or read the transcript.

23 Aug 2022

All of Open Research Institute's live demonstrations from DEFCON 30. Exhibit in @RF Hackers Sanctuary
  • 6 participants
  • 8 minutes
radio
vocoder
voice
signal
vhf
transmitting
audio
technical
frequency
protocol
youtube image

23 Aug 2022

See https://openrtx.org to support OpenRTX
see @M17 Project to find M17's videos.
  • 5 participants
  • 4 minutes
radio
vocoder
voice
signal
transmitting
protocol
w5nyv
technology
ori
amateur
youtube image

14 Aug 2022

Open Research Institute at DEF CON 30

💬 DISCORD Invite - https://discord.gg/jCNdNPKygP

👉 Subscribe to this channel - https://www.youtube.com/alexchaveriat?sub_confirmation=1
👉 Subscribe to the Hacker Hangouts channel - https://www.youtube.com/hackerhangouts?sub_confirmation=1

🌎 Website: https://alexchaveriat.com
📧 Newsletter: https://newsletter.alexchaveriat.com
🤘Twitter: https://twitter.com/alexchaveriat
📸 Equipment Kit - https://kit.co/alexchaveriat
  • 2 participants
  • 6 minutes
satellite
volunteers
radio
open
institute
authorization
service
funded
satellites
experiment
youtube image

5 Aug 2021

When researching methods for covert communications in the wireless space, we noticed most hackers are barely looking below the IP layer, and even the wireless guys are focused on creating their own radio (PHY layer) solutions rather than looking at what’s already available to them. We discovered a sweet spot that takes advantage of MAC layer protocols in LTE and 5G, enabling long range communication using other people’s networks, GSMA CVD-2021-0045. We can use SPARROW devices almost everywhere in a variety of scenarios, such as data exfiltration and command and control. Despite limited data rates, the new scheme can defeat known covert communication schemes with dedicated PHY in the following ways:

- Maximum Anonymity: SPARROW devices do not authenticate with the host network while operating. This eliminates their exposure to network security and lawful intercept systems as well as spectrum scanners. Utilizing limited resources, they cause very minimal impact on the host network services.
- More Miles per Watt: SPARROW devices can be several miles apart exploiting broadcast power of base stations or non-terrestrial technologies. The range can be further extended by deploying several of them in a geographically sparse mesh network.
- Low Power & Low Complexity: SPARROW devices can utilize existing protocol implementation libraries installed on commodity SDRs. They can operate on batteries or harvest energy from the environment for long durations, just like real sparrows!

REFERENCES:
There are no direct references of prior study that I (Reza) have (aside from general knowledge of 5G standard and RF), however the following talks and items led me towards this discovery:
- DEF CON Safe Mode - James Pavur - Whispers Among the Stars - https://www.youtube.com/watch?v=ku0Q_Wey4K0
- DNS Data Exfiltration techniques
- My boss buying me a 5G base station emulator and saying "find something wrong with this!"
  • 4 participants
  • 44 minutes
cybersecurity
technologies
exploits
protocols
communications
geeks
covert
ati
keysight
researcher
youtube image