23 Aug 2022
All of Open Research Institute's live demonstrations from DEFCON 30. Exhibit in @RF Hackers Sanctuary
- 6 participants
- 8 minutes
23 Aug 2022
See https://openrtx.org to support OpenRTX
see @M17 Project to find M17's videos.
see @M17 Project to find M17's videos.
- 5 participants
- 4 minutes
14 Aug 2022
Open Research Institute at DEF CON 30
💬 DISCORD Invite - https://discord.gg/jCNdNPKygP
👉 Subscribe to this channel - https://www.youtube.com/alexchaveriat?sub_confirmation=1
👉 Subscribe to the Hacker Hangouts channel - https://www.youtube.com/hackerhangouts?sub_confirmation=1
🌎 Website: https://alexchaveriat.com
📧 Newsletter: https://newsletter.alexchaveriat.com
🤘Twitter: https://twitter.com/alexchaveriat
📸 Equipment Kit - https://kit.co/alexchaveriat
💬 DISCORD Invite - https://discord.gg/jCNdNPKygP
👉 Subscribe to this channel - https://www.youtube.com/alexchaveriat?sub_confirmation=1
👉 Subscribe to the Hacker Hangouts channel - https://www.youtube.com/hackerhangouts?sub_confirmation=1
🌎 Website: https://alexchaveriat.com
📧 Newsletter: https://newsletter.alexchaveriat.com
🤘Twitter: https://twitter.com/alexchaveriat
📸 Equipment Kit - https://kit.co/alexchaveriat
- 2 participants
- 6 minutes
5 Aug 2021
When researching methods for covert communications in the wireless space, we noticed most hackers are barely looking below the IP layer, and even the wireless guys are focused on creating their own radio (PHY layer) solutions rather than looking at what’s already available to them. We discovered a sweet spot that takes advantage of MAC layer protocols in LTE and 5G, enabling long range communication using other people’s networks, GSMA CVD-2021-0045. We can use SPARROW devices almost everywhere in a variety of scenarios, such as data exfiltration and command and control. Despite limited data rates, the new scheme can defeat known covert communication schemes with dedicated PHY in the following ways:
- Maximum Anonymity: SPARROW devices do not authenticate with the host network while operating. This eliminates their exposure to network security and lawful intercept systems as well as spectrum scanners. Utilizing limited resources, they cause very minimal impact on the host network services.
- More Miles per Watt: SPARROW devices can be several miles apart exploiting broadcast power of base stations or non-terrestrial technologies. The range can be further extended by deploying several of them in a geographically sparse mesh network.
- Low Power & Low Complexity: SPARROW devices can utilize existing protocol implementation libraries installed on commodity SDRs. They can operate on batteries or harvest energy from the environment for long durations, just like real sparrows!
REFERENCES:
There are no direct references of prior study that I (Reza) have (aside from general knowledge of 5G standard and RF), however the following talks and items led me towards this discovery:
- DEF CON Safe Mode - James Pavur - Whispers Among the Stars - https://www.youtube.com/watch?v=ku0Q_Wey4K0
- DNS Data Exfiltration techniques
- My boss buying me a 5G base station emulator and saying "find something wrong with this!"
- Maximum Anonymity: SPARROW devices do not authenticate with the host network while operating. This eliminates their exposure to network security and lawful intercept systems as well as spectrum scanners. Utilizing limited resources, they cause very minimal impact on the host network services.
- More Miles per Watt: SPARROW devices can be several miles apart exploiting broadcast power of base stations or non-terrestrial technologies. The range can be further extended by deploying several of them in a geographically sparse mesh network.
- Low Power & Low Complexity: SPARROW devices can utilize existing protocol implementation libraries installed on commodity SDRs. They can operate on batteries or harvest energy from the environment for long durations, just like real sparrows!
REFERENCES:
There are no direct references of prior study that I (Reza) have (aside from general knowledge of 5G standard and RF), however the following talks and items led me towards this discovery:
- DEF CON Safe Mode - James Pavur - Whispers Among the Stars - https://www.youtube.com/watch?v=ku0Q_Wey4K0
- DNS Data Exfiltration techniques
- My boss buying me a 5G base station emulator and saying "find something wrong with this!"
- 4 participants
- 44 minutes