From the course: Threat Modeling: Information Disclosure in Depth

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Non-internet data

Non-internet data

From the course: Threat Modeling: Information Disclosure in Depth

Start my 1-month free trial

Non-internet data

- [Instructor] With the internet having won, it's easy to forget there are still systems which communicate without IP packets and there are lots of substrates other than wifi. GPS, TV and radio, nearfield and Bluetooth, Zigbee. The list goes on and on. They include non-radio communication like QR code or ultrasound beacons. There are lots of ways IP packets get carried, such as wifi, cellular systems like 3G or LTA. Some weirdos even put IP6 packets in IP4 packets or lease lines from a phone company. The tools to attack these systems are more specialized than the tools to attack standard IP networks, but don't confuse that for more security. As a general rule, these systems are not very secure. Their system designs have not been carefully analyzed, and even if they have been, the problems may persist. They'll even use proprietary ciphers, which is always a red flag. Don't mistake the lack of tools in Kali Linux for…

Contents