From the course: Threat Modeling: Information Disclosure in Depth
Unlock the full course today
Join today to access over 22,500 courses taught by industry experts or purchase this course individually.
Non-internet data
From the course: Threat Modeling: Information Disclosure in Depth
Non-internet data
- [Instructor] With the internet having won, it's easy to forget there are still systems which communicate without IP packets and there are lots of substrates other than wifi. GPS, TV and radio, nearfield and Bluetooth, Zigbee. The list goes on and on. They include non-radio communication like QR code or ultrasound beacons. There are lots of ways IP packets get carried, such as wifi, cellular systems like 3G or LTA. Some weirdos even put IP6 packets in IP4 packets or lease lines from a phone company. The tools to attack these systems are more specialized than the tools to attack standard IP networks, but don't confuse that for more security. As a general rule, these systems are not very secure. Their system designs have not been carefully analyzed, and even if they have been, the problems may persist. They'll even use proprietary ciphers, which is always a red flag. Don't mistake the lack of tools in Kali Linux for…