White Hat Hacker

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 66 Experts worldwide ranked by ideXlab platform

Cotret Pascal - One of the best experts on this subject based on the ideXlab platform.

  • Hit the KeyJack: stealing data from your daily wireless devices incognito
    HAL CCSD, 2016
    Co-Authors: Fournier Guillaume, Matoussowsky Pierre, Cotret Pascal
    Abstract:

    National audienceInternet of Things (IoT) is one of the most fast-growing field in high technologies nowadays. Therefore, lots of electronic devices include wireless connections with several communication protocols (WiFi, ZigBee, Sigfox, LoRa and so on). Nevertheless, designers of such components do not take care of security features most of the time while focusing on communication reliability (speed, throughput and low power consumption). As a consequence, several wireless IoT devices transmit data in plaintext creating lots of security breaches for both eavesdropping and data injection attacks. This work introduces KeyJack, a preliminary proof-of-concept of a solution aiming to eavesdrop wireless devices and hopefully perform injection attacks afterwards. KeyJack operates on widely-used devices: our keyboards! This solution is based on low-cost embedded electronics and gives an attacker or a White Hat Hacker the possibility to retrieve data from John Doe's computer. This work also shows tHat this approach could be used to any wireless device using 2.4GHz radio chips like the NRF24L01 from Nordic Semiconductor

  • Hit the KeyJack: stealing data from your daily wireless devices incognito
    2016
    Co-Authors: Fournier Guillaume, Matoussowsky Pierre, Cotret Pascal
    Abstract:

    Internet of Things (IoT) is one of the most fast-growing field in high technologies nowadays. Therefore, lots of electronic devices include wireless connections with several communication protocols (WiFi, ZigBee, Sigfox, LoRa and so on). Nevertheless, designers of such components do not take care of security features most of the time while focusing on communication reliability (speed, throughput and low power consumption). As a consequence, several wireless IoT devices transmit data in plaintext creating lots of security breaches for both eavesdropping and data injection attacks. This work introduces KeyJack, a preliminary proof-of-concept of a solution aiming to eavesdrop wireless devices and hopefully perform injection attacks afterwards. KeyJack operates on widely-used devices: our keyboards! This solution is based on low-cost embedded electronics and gives an attacker or a White Hat Hacker the possibility to retrieve data from John Doe's computer. This work also shows tHat this approach could be used to any wireless device using 2.4GHz radio chips like the NRF24L01 from Nordic Semiconductor.Comment: Journ\'ees C&ESAR 2016 (https://www.cesar-conference.org/

Thomas J Holt - One of the best experts on this subject based on the ideXlab platform.

Fournier Guillaume - One of the best experts on this subject based on the ideXlab platform.

  • Hit the KeyJack: stealing data from your daily wireless devices incognito
    HAL CCSD, 2016
    Co-Authors: Fournier Guillaume, Matoussowsky Pierre, Cotret Pascal
    Abstract:

    National audienceInternet of Things (IoT) is one of the most fast-growing field in high technologies nowadays. Therefore, lots of electronic devices include wireless connections with several communication protocols (WiFi, ZigBee, Sigfox, LoRa and so on). Nevertheless, designers of such components do not take care of security features most of the time while focusing on communication reliability (speed, throughput and low power consumption). As a consequence, several wireless IoT devices transmit data in plaintext creating lots of security breaches for both eavesdropping and data injection attacks. This work introduces KeyJack, a preliminary proof-of-concept of a solution aiming to eavesdrop wireless devices and hopefully perform injection attacks afterwards. KeyJack operates on widely-used devices: our keyboards! This solution is based on low-cost embedded electronics and gives an attacker or a White Hat Hacker the possibility to retrieve data from John Doe's computer. This work also shows tHat this approach could be used to any wireless device using 2.4GHz radio chips like the NRF24L01 from Nordic Semiconductor

  • Hit the KeyJack: stealing data from your daily wireless devices incognito
    2016
    Co-Authors: Fournier Guillaume, Matoussowsky Pierre, Cotret Pascal
    Abstract:

    Internet of Things (IoT) is one of the most fast-growing field in high technologies nowadays. Therefore, lots of electronic devices include wireless connections with several communication protocols (WiFi, ZigBee, Sigfox, LoRa and so on). Nevertheless, designers of such components do not take care of security features most of the time while focusing on communication reliability (speed, throughput and low power consumption). As a consequence, several wireless IoT devices transmit data in plaintext creating lots of security breaches for both eavesdropping and data injection attacks. This work introduces KeyJack, a preliminary proof-of-concept of a solution aiming to eavesdrop wireless devices and hopefully perform injection attacks afterwards. KeyJack operates on widely-used devices: our keyboards! This solution is based on low-cost embedded electronics and gives an attacker or a White Hat Hacker the possibility to retrieve data from John Doe's computer. This work also shows tHat this approach could be used to any wireless device using 2.4GHz radio chips like the NRF24L01 from Nordic Semiconductor.Comment: Journ\'ees C&ESAR 2016 (https://www.cesar-conference.org/

Jeroen Ham - One of the best experts on this subject based on the ideXlab platform.

Pascal Cotret - One of the best experts on this subject based on the ideXlab platform.

  • Hit the KeyJack: stealing data from your daily wireless devices incognito
    2016
    Co-Authors: Guillaume Fournier, Pierre Matoussowsky, Pascal Cotret
    Abstract:

    Internet of Things (IoT) is one of the most fast-growing field in high technologies nowadays. Therefore, lots of electronic devices include wireless connections with several communication protocols (WiFi, ZigBee, Sigfox, LoRa and so on). Nevertheless, designers of such components do not take care of security features most of the time while focusing on communication reliability (speed, throughput and low power consumption). As a consequence, several wireless IoT devices transmit data in plaintext creating lots of security breaches for both eavesdropping and data injection attacks. This work introduces KeyJack, a preliminary proof-of-concept of a solution aiming to eavesdrop wireless devices and hopefully perform injection attacks afterwards. KeyJack operates on widely-used devices: our keyboards! This solution is based on low-cost embedded electronics and gives an attacker or a White Hat Hacker the possibility to retrieve data from John Doe's computer. This work also shows tHat this approach could be used to any wireless device using 2.4GHz radio chips like the NRF24L01 from Nordic Semiconductor.