Meetup in San Francisco


Details
Live stream URL: https://www.youtube.com/watch?v=m1wsd3nitD8
IRC: #cyberspectrum on Freenode!
Updates @spenchdotnet (https://twitter.com/spenchdotnet)
Some exciting speakers on the list!!!
http://photos1.meetupstatic.com/photos/event/d/6/f/600_442503439.jpeg
• "Etch-A-SDR" by Nate (@devnulling (https://twitter.com/devnulling))
In this talk I will be doing a quick show and tell of building the 'Etch-A-SDR'. The 'Etch-A-SDR' is a digital Etch-a-Sketch, that doubles as a fully contained SDR platform.
I am a programmer by day, SDR Enthusiast / Hobbyist, Maker, and Amateur Radio operator by night.
http://photos2.meetupstatic.com/photos/event/9/a/b/5/600_442419605.jpeg
• "Spread spectrum SATCOM Hacking: Attacking the GlobalStar Simplex Data Service" by Colby Moore (@colbymoore (https://twitter.com/colbymoore))
Recently, there have been several highly publicized talks about satellite hacking. However, most only touch on the theoretical rather than demonstrate actual vulnerabilities and real world attack scenarios. This talk will demystify some of the technologies behind satellite communications and do what no one has done before - take the audience step-by-step from reverse engineering to exploitation of the GlobalStar simplex satcom protocol and demonstrate a full blown signals intelligence collection and spoofing capability. I will also demonstrate how an attacker might simulate critical conditions in satellite connected SCADA systems.
In recent years, Globalstar has gained popularity with the introduction of its consumer focused SPOT asset-tracking solutions. During the session, I'll deconstruct the transmitters used in these (and commercial) solutions and reveal design and implementation flaws that result in the ability to intercept, spoof, falsify, and intelligently jam communications. Due to design tradeoffs these vulnerabilities are realistically unpatchable and put millions of devices, critical infrastructure, emergency services, and high value assets at risk.
Colby Moore is Synack's Manager of Special Activities. He works on the oddball and difficult problems that no one else knows how to tackle and strives to embrace the attacker mindset during all engagements. He is a former employee of VRL and has identified countless 0-day vulnerabilities in embedded systems and major applications. In his spare time you will find him focusing on that sweet spot where hardware and software meet, usually resulting in very interesting consequences.
http://photos4.meetupstatic.com/photos/event/d/9/8/600_442503480.jpeg

Meetup in San Francisco