DEF CON 22 - Michael Ossmann - The NSA Playset: RF Retroreflectors

  Рет қаралды 183,532

DEFCONConference

DEFCONConference

Күн бұрын

Пікірлер: 80
@philorkill
@philorkill 3 жыл бұрын
6 yeard and I'm still trying to figure out the basics. Thank you!
@andretarvok7122
@andretarvok7122 3 жыл бұрын
Tell me about it i love these nsa playset talks cant get enough
@SarahKchannel
@SarahKchannel 2 ай бұрын
Just think RFID tag, practically the same, except the reflected payload is a signal picked up locally and not just an embedded response packet - like a serial number.
@ganjajoe2566
@ganjajoe2566 7 жыл бұрын
Thanks for sharing!!! I'm an RF noob, and I just got a hackRF and Ettus USRP N210 with a lot of boards for it. I love learning about this stuff! Very fascinating to me.
@Phantom0fTheRouter
@Phantom0fTheRouter 2 жыл бұрын
I had a lot of fun listening to the tones of the key presses on my TRS-80 PC2 on my GE clock radio back in the early 80s...
@---do2qd
@---do2qd 7 жыл бұрын
He's a very talented public speaker. Great job
@Arctic-fox717
@Arctic-fox717 Жыл бұрын
Handsome too
@jacopo1farina
@jacopo1farina 6 жыл бұрын
A little trivia: the soviet spying device they display at 11:00 was invented by Léon Theremin, the same guy who invented the musical instrument
@funkosaurus1
@funkosaurus1 6 жыл бұрын
Swet. I have a Theremin I'm getting rid of. I haven't touched it in years.
@GospodinJean
@GospodinJean 5 жыл бұрын
and the father of RFID kind of
@prodbydramatic
@prodbydramatic 2 жыл бұрын
@@funkosaurus1 I hope u kept it iv always wanted one
@ralphe9668
@ralphe9668 3 жыл бұрын
so happy 😁 to find this thank you so much for the presentation
@larrbaII
@larrbaII 2 жыл бұрын
This is a lot on how you can a 808 Laser to read vibrations off an idem ,reflected back to to a censer that can decode to auto output.
@AEON.
@AEON. 2 жыл бұрын
Reminds me of the "Bill Swearingen - HAKC THE POLICE - DEF CON 27 Conference" talk. The radar talk lol. That was 2 years ago - is this something that came out of that open source work? Very interesting. (Did this talk influence and help the Bill Swearingen work? I mean - Just to be clear.)
@AEON.
@AEON. 2 жыл бұрын
We can view what you're dreaming wirelessly now - we can visualize wifi signals and see through any building - we can read the vibration on a window plane of what someone is saying in real time.
@NipkowDisk
@NipkowDisk 6 жыл бұрын
Ah, yes, RF illumination... The Great Seal incident immediately comes to mind.
@vikrantvijit1436
@vikrantvijit1436 3 жыл бұрын
Great talk on Research Gaps or rather Black holes nature of radio art and sciencey things at technical beings.
@johndunn5272
@johndunn5272 Жыл бұрын
How will the NSA detect quantum mechanical designed bugs ?
@chriskaprys
@chriskaprys 7 жыл бұрын
what about "massive attacks"? :)
@docpedersen7582
@docpedersen7582 8 жыл бұрын
Info on great seal bug incorrect. Wasn't in an embassy, was in UN security council chamber in New York. Was discovered by ham -British as I recall- operator who also worked at UN and realized what he stumbled on shouldn't have been broadcast. He reported signal to authorities, which finally led to discovery. Seal was a gift to UN by Russians.
@andreassjoberg3145
@andreassjoberg3145 5 жыл бұрын
OOOOH! Goood old Trojan-horse rides again!
@The_Seeker
@The_Seeker 5 жыл бұрын
Neither of these are true, it was hung in the Spaso House, which was the US ambassador's residence in Moscow.
@bojo8981
@bojo8981 Жыл бұрын
I think I can prove the NSA can/does calculate the precise location of users of the "hidden services" BEFORE they are allowed to use the "hidden services". What should I do? Who would I report it to?
@Arctic-fox717
@Arctic-fox717 Жыл бұрын
Your Mama
@JasonDimmick
@JasonDimmick Жыл бұрын
Is this the technology created by Joseph Theremin for the self named Theremin musical instrument?
@joeb3300
@joeb3300 Жыл бұрын
Leon Theremin (Lev Sergeyevich Termen)
@wesleyfeldsine7955
@wesleyfeldsine7955 5 жыл бұрын
As far as countermeasures, a Faraday cage may be the best bet at the moment. Unless you know the frequency being used (1-4ghz??) to attack you and you can flood that frequency with lots of random noise (non random noise could possibly be deciphered from looking at [+/-]interference, but then we are outside the range of active RF-Retroreflective talks.)
@WhiteBoiDave
@WhiteBoiDave 4 жыл бұрын
The Wizard of Oss.........#bestman
@64-bit63
@64-bit63 2 жыл бұрын
Cant you make one with a rpi4?
@GT101Nofear
@GT101Nofear 10 жыл бұрын
Now. .. I enjoyed watching this and all. .. But what's the RF Retroreflector really suppose to do? Is it like a Sonar canceller? Would firing this up cause a DOS to Radio frequencies? I'm confused as to what is supposed to do.
@elmotox
@elmotox 10 жыл бұрын
.
@OlDurtyGurty
@OlDurtyGurty 10 жыл бұрын
You solder the retroflectors inline with the data on a device and with another RF device, you can read the device with the retroflector from a distance. The sine waves he showed is the pulse that a PS/2 keyboard sends when you press the key "Q" from what I understand.
@PhillipRhodes
@PhillipRhodes 3 жыл бұрын
It's a way to snoop on signals from a distance, but you use a passive "reflector" instead of an active "transmitter". If you watch old spy movies or shows like "Get Smart" they would plant "bugs" on people or in rooms, that transmitted a signal (like audio from the room). But this is bad because it requires a power source, which makes the device bigger and easier to locate, and because the active transmission from the device can be detected any time it is transmitting. Hence the old idea of "sweeping for bugs". With this "reflector" idea, the "bug" doesn't transmit a signal of its own. A separate transmitter transmits into the room, and the mere presence of the "reflector" affects the transmitted signal in a way that can be detected by monitoring the same frequency you're transmitting on. It the extent to which it tweaks the transmitted signal is driven by some signal you want to monitor (like the data line of a PS/2 keyboard cable) you can decode the signal you want to snoop on, by looking at how the signal from the transmitter gets distorted. In the latter model, the "bug" is smaller, needs no power source (eg a battery or whatever), and doesn't really transmit a signal of its own, which would theoretically make it much harder to locate. There are some over-simplifications in what I just wrote, I but I think that captures the basic essence of the idea.
@jaimedavilaperez
@jaimedavilaperez 5 жыл бұрын
very interesting..would try
@davidlee50
@davidlee50 2 жыл бұрын
What replaced it?
@martonlerant5672
@martonlerant5672 8 жыл бұрын
Well in a pretty old book written in the soviet era, it seems that westerners were a lot more in the dark about these tools than we were
@BigHonkinGoose
@BigHonkinGoose 5 жыл бұрын
No kidding. What was the book?
@Aemilindore
@Aemilindore 6 жыл бұрын
Need more Michel osman.. More.. More more mkre.
@drnv150
@drnv150 4 жыл бұрын
How many think there is alot of unknown data passed over HF shortwave now that 3G data speeds are possible, especially considering relatively few care to monitor HF and are mostly monitoring IT infrastructure, I.E.... Nelly O.? Hard to block or jam a station sending ALE 3G running 1.5 kilowatts transmit power, especially at random times on various HF bands with a mobile magnetic loop antenna. Bad part being, if your RF gear is really close to the 30 kv cap, it goes pooooof...
@vanhetgoor
@vanhetgoor 7 жыл бұрын
Countermeasures: one winding coil, and an ever changing capacitor, like the combinations of a varicap with ntc (temperature censor) and ldr (to detect light).
@Hektabyte
@Hektabyte 5 жыл бұрын
That's a actually a great idea, I'll try it out this week when I get proper equipment.
@vanhetgoor
@vanhetgoor 3 жыл бұрын
​@Ura Fag Very simple, it has to be passive and for ever as much changes as possible, light is oftener changing then the room temperature.
@andreassjoberg3145
@andreassjoberg3145 5 жыл бұрын
So, RF-shielding is going to get even more important, and the new 5G Cellphone net will be passively illuminating stuff with 5GHz - tinfoil-hats ON!
@Thefreakyfreek
@Thefreakyfreek 2 ай бұрын
10:26 the engineering team rolling in thier graves as some 21 century WizKid pigbacking on decades of tenological development calling thier magnum opus a "simple device"
@retepignus2626
@retepignus2626 6 жыл бұрын
Is this what we call now "AirGap"?
@CucamongaGuy
@CucamongaGuy 3 жыл бұрын
How it's done > 10:40
@i93sme
@i93sme 3 жыл бұрын
Basically a fancy name for an RF tag
@timk1595
@timk1595 9 жыл бұрын
where would one learn about "hacking" (very broad term)?
@Calvert1212
@Calvert1212 9 жыл бұрын
Hacking is the application of knowledge and critical thinking to make something do something it wasn't designed to do, so you'll need to be more specific.
@Calvert1212
@Calvert1212 9 жыл бұрын
Seeing as this is a defcon video I will assume you mean either rf, software, hardware, network, wifi, Bluetooth, phreaking, etc. etc. which one interests you most?
@Calvert1212
@Calvert1212 9 жыл бұрын
Chad Calvert sorry for the post spam, this is kinda stream of conscience. The very first thing I suggest is to download Kali linux on your computer. It is a free Debian distribution of Linux that comes preloaded with all the tools you need to practice many different forms of hacking, such as: HID attacks, fuzzing, debugging, scripting, programming, MitM, software defined radio, Metasploit, MAC spoofing, badUSB, brute forcing, dictionary attacks, DDoS (if that counts), SSL stripping, arp poisoning(a more specific type of MitM attack), hash passing, stack bashing, cookie injection, SQL injection (goes without saying) and so on. Hacking, more specifically information security in this case (infosec, or antisec if you are more of a rebel), is an art form which requires knowledge of computer, cryptological, social and communications processes so that one can identify weakness in a given system so as to fix or exploit them. A more accurate term for this is "cracking".
@timk1595
@timk1595 9 жыл бұрын
***** Chad Calvert Appreciate all the info you listed. I would be looking more towards software. Defiantly going to check out Kali Linux. Thanks for taking the time to elaborate. :D
@tiberiu_nicolae
@tiberiu_nicolae 9 жыл бұрын
+Isiah F Hackaday.com shows all kinds of hacks
@nobodynoone2500
@nobodynoone2500 Жыл бұрын
retro reflection was researched way before the 40s, you aren't using the right terms to findthem, because they were not yet defined. There are literally papers from the 1880's discussing it.
@goiterlanternbase
@goiterlanternbase Жыл бұрын
Searching for hidden patents? Attempt for a patent on something similar to the thing that should be patented but isn't.
@johnaweiss
@johnaweiss Ай бұрын
Won't a 10 GHz device have very short range, and terrible NLOS performance?
@mountainconstructions
@mountainconstructions 6 жыл бұрын
People in the audience have no idea
@gummipalle
@gummipalle 9 жыл бұрын
one in 22,000 doesnt like this.... Thats a fine ratio.... Or a hack result.....
@leocurious9919
@leocurious9919 8 жыл бұрын
+Frabbledabble I only see 159 linkes and 3 dislikes. Where are those 22'000 likes?
@gummipalle
@gummipalle 8 жыл бұрын
+Leo Curious nono, one of 22,000 views :-)
@yshouldifoogle6724
@yshouldifoogle6724 7 жыл бұрын
Encourage leaks by crowd sourcing Bitcoin $ to pay for them. untraceable money and leakers can stay private.
@JohnDoe-nq4du
@JohnDoe-nq4du 5 жыл бұрын
bitcoin is the most traceable currency ever devised. every active bitcoin wallet on earth contains a plain-text record of every bitcoin transaction ever completed. combined with the right opsec practices, it is possible to use bitcoin as part of a system to dissociate one's legal identity from activities carried out using bitcoin, but just using bitcoin doesn't make it even really all that inconvenient to identify you. pseudonymous =/= anonymous
@AEON.
@AEON. 2 жыл бұрын
Thanks to 3rd party advertising and tracking of everyone - it's easy - very easy - to passively intercept data and even man in the middle it and shoot it back out.
@Paraboemba
@Paraboemba 5 жыл бұрын
aka. BACKSCATTERING
REAL or FAKE? #beatbox #tiktok
01:03
BeatboxJCOP
Рет қаралды 18 МЛН
Правильный подход к детям
00:18
Beatrise
Рет қаралды 11 МЛН
Support each other🤝
00:31
ISSEI / いっせい
Рет қаралды 81 МЛН
99.9% IMPOSSIBLE
00:24
STORROR
Рет қаралды 31 МЛН
Michael Ossmann: Simple RF Circuit Design
1:06:21
HACKADAY
Рет қаралды 258 М.
DEF CON 22 - Dr. Philip Polstra -  Am I Being Spied On?
42:04
DEFCONConference
Рет қаралды 131 М.
I'll Let Myself In: Tactics of Physical Pen Testers
44:56
Wild West Hackin' Fest
Рет қаралды 2,9 МЛН
Radio Hacking: Cars, Hardware, and more! - Samy Kamkar - AppSec California 2016
51:12
Bill Swearingen - HAKC THE POLICE - DEF CON 27 Conference
41:18
DEFCONConference
Рет қаралды 642 М.
REAL or FAKE? #beatbox #tiktok
01:03
BeatboxJCOP
Рет қаралды 18 МЛН