♫musicjinni

DEF CON 22 - Paul Drapeau and Brent Dukes - Steganography in Commonly Used HF Radio Protocols

video thumbnail
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Drapeau-Dukes/DEFCON-22-Drapeau-Dukes-Steganography-in-Commonly-Used-HF-Radio-Protocols-UPDATED.pdf

Additional Extra Materials are available here: https://defcon.org/images/defcon-22/dc-22-presentations/Drapeau-Dukes/Paul%20Drapeau%20and%20Brent%20Dukes%20-%20Extras.zip

Steganography in Commonly Used HF Radio Protocols
Paul Drapeau PRINCIPAL SECURITY RESEARCHER, CONFER TECHNOLOGIES INC.
Brent Dukes
Imagine having the capability to covertly send messages to an individual or a larger audience, without the need for large centralized infrastructure where your message could be observed, intercepted, or tampered with by oppressive governments or other third parties. We will discuss the opportunities and challenges with steganography implementations in widely used amateur radio digital modes, and present a proof of concept implementation of hiding messages within innocuous transmissions using the JT65 protocol. This technique could theoretically be used to implement a low cost, low infrastructure, covert, world wide short message broadcasting or point to point protocol. No messages in codes or ciphers intended to obscure the meaning thereof were actually transmitted over the amateur bands during the creation of this talk.

Paul Drapeau is currently the Principal Security Researcher for Confer Technologies Inc. He has held senior level IT security roles and consulted on information security topics for various organizations for over 15 years. Paul has a bachelor's degree in computer science from the University of Rhode Island and has been licensed as an amateur radio operator since 1986.

Brent Dukes has a decade of experience working in software and systems engineering roles. He spends his nights tied to various hardware hacking projects sitting in pieces all over his lab, and participating in CTFs. His idea of fun is reverse engineering and modifying toys and consumer electronics for the purposes of good. Brent has been a licensed amateur radio operator since 2006.

Paul Drapeau - Twitter: @pdogg77
Brent Dukes - Twitter: @TheDukeZip

DEF CON 22 - Cesar Cerrudo - Hacking US (and UK, Australia, France, etc.) traffic control systems

DEF CON 22 - Deviant Ollam & Howard Payne - Elevator Hacking - From the Pit to the Penthouse

DEF CON 22 - Glenn Wilkinson - Practical Aerial Hacking & Surveillance

DEF CON 22 - Panel - DEF CON the Mystery, Myth, and Legend

DEF CON 22 - Metacortex and Grifter - Touring the Darkside of the Internet. An Introduction to Tor

DEF CON 22 - Nemus - An Introduction to Back Dooring Operating Systems for Fun and Trolling

DEF CON 22 - XlogicX & chap0 - Abuse of Blind Automation in Security Tools

DEF CON 22 - Chris Littlebury - Home Alone with localhost: Automating Home Defense

DEF CON 22 - Tim Strazzere and Jon Sawyer - Android Hacker Protection Level 0

DEF CON 22 - Brent White - Corporate Espionage

DEF CON 22 - Major Malfunction - Old Skewl Hacking - Porn Free!

DEF CON 22 - Jason Healey - Saving the Internet (for the Future)

DEF CON 22 - Blake Self and Shawn "cisc0ninja" Burrell - Don't DDoS Me Bro: Practical DDoS Defense

DEF CON 22 - Zoltán Balázs - Bypass firewalls, application white lists...

DEF CON 22 - Keren Elazari - Empowering Hackers to Create a Positive Impact

DEF CON 22 - Ryan Noah Shapiro - Hacking the FBI - How & Why to Liberate Government Records

DEF CON 22 - Dameff, Tully, and Hefley - Hacking 911: Adventures in Disruption, Destruction & Death

DEF CON 22 - Grant Bugher - Detecting Bluetooth Surveillance Systems

DEF CON 22 - Ladar Levison and Stephen Watt - Dark Mail

DEF CON 22 - Dominic White and Ian de Villiers - Manna from Heaven

DEF CON 22 - Jim Denaro and Tod Beardsley - How to Disclose an Exploit Without Getting in Trouble

DEF CON 22 - Christopher Soghoian - Blinding The Surveillance State

DEF CON 22 - Paul Such 0x222 and Agix - Playing with Car Firmware or How to Brick your Car

DEF CON 22 - Charlie Miller & Chris Valasek - A Survey of Remote Automotive Attack Surfaces

DEF CON 22 - Anch - The Monkey in the Middle: A pentesters guide to playing in traffic.

DEF CON 22 - Gene Bransfield - Weaponizing Your Pets: The War Kitteh and the Denial of Service Dog

DEF CON 22 - Weston Hecker - Burner Phone DDOS 2 dollars a day : 70 Calls a Minute

DEF CON 22 - Eijah - Saving Cyberspace by Reinventing File Sharing

DEF CON 22 - Ryan Kazanciyan and Matt Hastings, Investigating PowerShell Attacks

DEF CON 22 - Brian Gorenc and Matt Molinyawe - Building Your Own SMS/MMS Fuzzer

Disclaimer DMCA