"In our modern world, countless applications rely on radio frequency elements" - an Interview with Larbi Ouiyzme - Pentestmag

"In our modern world, countless applications rely on radio frequency elements" - an Interview with Larbi Ouiyzme

Oct 12, 2023

About the Author: Larbi OUIYZME Cybersecurity Consultant and Licensed Ham Radio Operator since 1988 with prefix CN8FF, deeply passionate about RF measurement, antennas, satellites, Software-defined radio, Digital Mobile Radio and RF Pentesting.

1. How effective are attackers with regard to RF in eavesdropping, DoS & DDoS, MitM, spoofing and malware propagation? Are there any interesting case studies?

Attackers can be highly effective in RF attacks, including:

  • Eavesdropping: Vulnerable RF signals can be intercepted and decoded.
  • DoS & DDoS: Attackers can flood RF channels, causing disruption.
  • MitM (Man-in-the-Middle): RF traffic can be intercepted and manipulated.
  • Spoofing: Attackers can impersonate legitimate devices.
  • Malware Propagation: RF signals can carry malware or by OTA upgrade.

 

Case studies: There are various instances of RF attacks, e.g., car key fob cloning, drone signal hijacking, and more.

 

Case study: Drone Hijacking

Drone signal hijacking, also known as drone signal spoofing or drone jamming, is a method employed by attackers to take unauthorized control of a drone by manipulating its communication signals. This malicious act involves disrupting or intercepting the radio frequency (RF) or communication link between the drone and its operator or GPS satellites. Here's a detailed explanation of how drone signal hijacking works:

  1. RF Communication in Drones:
October 12, 2023

Author

Larbi Ouiyzme
Latest Articles
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023