Try our dedicated image for https://rfswift.io!
#bladeRF #5G #SDR #rfswift
🔦 Our #pts25 program is out and booking site is up!
Let's start browsing together this awesome program with the #hardware & #Embedded session 🤩
- 📡 @FlUxIuS from @Penthertz will present #RFSwift a powerfull toolbox for wireless assessments !
- 👾 Aline Becq will expose her RETEX on building/running LabCyber, a fablab dedicated to CyberSecurity
- and Vincent LOPES from @quarkslab will speak about debugging embedded systems using unusual methods 🤔
🎟️ Book your (free) seat: https://pretix.eu/passthesalt/2025/
📖 Program: https://cfp.pass-the-salt.org/pts2025/schedule/
📅 July 1 to 3, 2025
📍 Lille, FR
🚀 RF Swift is getting even bigger: the Hardware section is now live!
Explore supported gear and setups to power up your RF adventures.
Check it out here 👉 https://rfswift.io/docs/guide/list-of-tools
Radiofrequency (RF) interfaces play a critical role in modern technologies, enabling connectivity for a wide range of devices such as Internet of Things (IoT) objects, electric vehicles (EVs), robotic systems, and critical infrastructures. While these interfaces offer innovative and practical solutions, they also expose attack surfaces that are often overlooked or poorly understood. If exploited by malicious actors, these vulnerabilities can compromise not only the confidentiality and security of data but also the availability of critical systems. This technical presentation aims to shed light on these risks by exploring specific vulnerabilities associated with RF communications. We will discuss methods to discover, analyze, and, in some cases, exploit these vulnerabilities for the purposes of security evaluation and reinforcement. During this session, participants will be introduced to methodologies and tools used in SIGINT (Signal Intelligence) and COMINT (Communication Intelligence) tasks. We will highlight practical and accessible approaches, with a particular focus on leveraging minimal, low-cost equipment to intercept and analyze RF communications. Through live demonstrations, we will showcase how these tools can be applied to identify and understand critical vulnerabilities. We will cover techniques for: Detection and Analysis of RF Signals: Steps to intercept and analyze communications between various connected devices. Identification of Attack Surfaces: How to locate and map potential entry points in modern systems. Reproduction and Exploitation of Captured Communications: Practical techniques for manipulating identified RF transmissions. Affordable Setup: Implementing an effective testing environment on a limited budget using open-source tools. The demonstrations will reinforce theoretical concepts, highlighting real-world examples such as exploiting vulnerabilities in IoT devices or connected vehicles.