San Francisco - Meetup #14


Details
Live stream: https://www.youtube.com/watch?v=P971PcQexFI
#cyberspectrum on Freenode
• Paul David (https://twitter.com/daulpavid): "gr-minecraft"
Paul will show off a Minecraft hack where one can stand up Lua "computers" within the game and talk to the outside world through TCP or HTTP. This was used to create a Minecraft frequency display linked to GNU Radio where periodic magnitude values are sent from GNU Radio and reflected on a redstone frequency display within Minecraft.
The gr-minecraft idea was inspired by a similar project to control a Wi-Fi lightbulb from within Minecraft. It's a great illustration of how easy it is to get data in and out of GNU Radio, and a testament of the endless possibilities within Minecraft itself.
http://photos2.meetupstatic.com/photos/event/5/5/4/0/600_447681824.jpeg
• Matt Knight (https://twitter.com/embeddedsec): "Attacking ZigBee Locks with Commodity Wireless Tools"
ZigBee and 802.15.4 are two widely proliferated wireless protocols that are commonly associated with the Internet of Things. This talk will delve into some of the practical aspects of attacking devices that utilize these protocols. In addition to presenting a live demo of a recently developed attack on a ZigBee lock, I will discuss the drawbacks of SDR-based tools and walk through a scenario where using a hardware-defined technology was advantageous.
http://photos4.meetupstatic.com/photos/event/9/a/0/6/600_447699430.jpeg
• Marc Newlin (https://twitter.com/marcnewlin): "MouseJack (https://www.mousejack.com)" (special remote appearance)
Marc will join us from Atlanta to discuss the keystroke injection vulnerability he discovered that affects seven vendors' wireless mouse dongles, allowing an attacker to transmit unencrypted keystrokes into a victim's computer.
http://photos3.meetupstatic.com/photos/event/7/9/4/4/600_447871044.jpeg
BIOS
Paul David
Paul David is currently an intern at Ettus Research and a graduate student from Virginia Tech. He primarily focuses on wireless communications and software-defined radio (SDR), as well as software development. He plans to restart his PhD research upon his return to school in the fall. He received his B.S. in Electrical Engineering from Clemson University in 2013 and his M.S. from Virginia Tech in 2015.
Matt Knight
Matt is a software engineer and security researcher with Bastille Networks. As a member of the RF Storm threat research team, he seeks to discover vulnerabilities in the ubiquitous wireless interfaces that connect and control devices and infrastructure on the Internet of Things. Matt holds a BA and a BE in electrical engineering from Dartmouth College.
Marc Newlin
Marc is a security researcher on the RF Storm threat research team at Bastille, where he focuses on RF/IoT threats present in enterprise environments. He has been hacking on software defined radios since 2013, when he competed as a finalist in the DARPA Spectrum Challenge. In 2011, he wrote software to reassemble shredded documents for the DARPA Shredder Challenge, finishing the competition in third place out of 9000 teams.

San Francisco - Meetup #14