Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Discover how to exploit vulnerabilities in Z-Wave networks using a mainstream device in this 20-minute Black Hat conference talk. Learn about the auto-discovery feature and backup/restore functionality that can be leveraged to take control of an entire Z-Wave network. Explore topics including Z-Wave security, device associations, complex attacks, and a new approach using controller IDs and DVBT tuners. Watch a live demonstration and gain insights into modifying controllers, exploiting autodiscovery, and manipulating node IDs to compromise Z-Wave systems.
Syllabus
Introduction
Features
Security
Devices
Raspberry Pi
ZWave Controller
ZWave Identifier
Association
Not Information Frame
Association and Parrying
Complex Attacks
New Approach
Controller ID
DVBT Tuner
Screenshot
Backup Restore
Backup Archive
Side Effects
Modifying the Controller
Autodiscovery
Node IDs
Demo
Summary
Taught by
Black Hat