RTCL is a telecommunications service provider that focuses on engineering, installation, commissioning, and maintenance services. It has over 380 full-time employees including 121 skilled O&M employees and 259 skilled TI employees. RTCL has an average annual turnover of approximately BDT 220 million. It aims to expand its passive network operation and maintenance services and has resource and transition plans to increase its workforce in skills like AG, PG, and civil works technicians. RTCL also has experience in scenario analysis to strengthen decision making for issues that may arise.
The document discusses CCAP and DOCSIS technology. It provides an overview of ARRIS, including its history of innovations in cable technology. It then summarizes the E6000 Converged Edge Router platform, including its high density, efficiency, simplicity and reliability. The document outlines ARRIS' roadmap for the E6000 platform, including future support for DOCSIS 3.1 through firmware upgrades to allow higher bandwidths without hardware changes.
This document provides an overview of IP RAN network design for 2G and 3G networks. It discusses key aspects of IP RAN including transport connectivity, network synchronization, quality of service, and security. The document also presents case studies of 2G and 3G network topologies designed using IP RAN principles.
Interior Gateway Routing Protocol (IGRP) is a proprietary distance-vector routing protocol developed by Cisco that is used within an autonomous system to exchange routing information. The document describes IGRP configuration and operation, including setting the autonomous system number, configuring IGRP on routers, and verifying IGRP routes and neighbor adjacencies. Key aspects of IGRP covered are metrics, timers, and network diagrams demonstrating IGRP configuration between three routers to exchange routes.
How to fight corruption in traffic police and improve road policing -Moldova...Gela Kvashilava
This document summarizes a report on a police exchange program between Moldova, Georgia, and the UK focused on road safety enforcement and reducing police corruption in Moldova. Key recommendations included reforming Moldova's traffic police based on examples from Georgia, where the entire police force was replaced, and the UK, where technology and training help enforcement. The report also addressed issues like drunk driving, vehicle equipment, traffic control, police training, driver licensing, and anti-corruption strategies. Early reforms in Moldova following the program included opening a new driver examination center with video monitoring and requiring traffic police to wear name tags.
RTCL is a telecommunications service provider that focuses on engineering, installation, commissioning, and maintenance services. It has over 380 full-time employees including 121 skilled O&M employees and 259 skilled TI employees. RTCL has an average annual turnover of approximately BDT 220 million. It aims to expand its passive network operation and maintenance services and has resource and transition plans to increase its workforce in skills like AG, PG, and civil works technicians. RTCL also has experience in scenario analysis to strengthen decision making for issues that may arise.
The document discusses CCAP and DOCSIS technology. It provides an overview of ARRIS, including its history of innovations in cable technology. It then summarizes the E6000 Converged Edge Router platform, including its high density, efficiency, simplicity and reliability. The document outlines ARRIS' roadmap for the E6000 platform, including future support for DOCSIS 3.1 through firmware upgrades to allow higher bandwidths without hardware changes.
This document provides an overview of IP RAN network design for 2G and 3G networks. It discusses key aspects of IP RAN including transport connectivity, network synchronization, quality of service, and security. The document also presents case studies of 2G and 3G network topologies designed using IP RAN principles.
Interior Gateway Routing Protocol (IGRP) is a proprietary distance-vector routing protocol developed by Cisco that is used within an autonomous system to exchange routing information. The document describes IGRP configuration and operation, including setting the autonomous system number, configuring IGRP on routers, and verifying IGRP routes and neighbor adjacencies. Key aspects of IGRP covered are metrics, timers, and network diagrams demonstrating IGRP configuration between three routers to exchange routes.
How to fight corruption in traffic police and improve road policing -Moldova...Gela Kvashilava
This document summarizes a report on a police exchange program between Moldova, Georgia, and the UK focused on road safety enforcement and reducing police corruption in Moldova. Key recommendations included reforming Moldova's traffic police based on examples from Georgia, where the entire police force was replaced, and the UK, where technology and training help enforcement. The report also addressed issues like drunk driving, vehicle equipment, traffic control, police training, driver licensing, and anti-corruption strategies. Early reforms in Moldova following the program included opening a new driver examination center with video monitoring and requiring traffic police to wear name tags.
The document provides information on configuring Cisco routers, including:
- Cisco IOS software uses different command modes to access groups of commands, including user EXEC, privileged EXEC, and configuration modes.
- IP addresses, routing protocols, and other settings are configured in privileged EXEC or configuration modes using commands like interface, ip address, router rip/ospf/eigrp, and more.
- Router and link status can be checked using LED indicators on ports and transceiver modules.
This document compares 3G and 4G mobile technologies. It notes that 3G provides data speeds up to 3.1 Mbps on average, while 4G can provide speeds up to 10 times faster at 100-300 Mbps. It outlines some key differences like 4G supporting higher peak upload/download speeds and quality of service features. Usage statistics are provided showing 3G has over 3 billion users worldwide compared to under 500 million for 4G currently. Potential advantages and drawbacks of both standards are also examined.
VoIP, or Voice over Internet Protocol, is a technology that allows routing of voice data through IP-based networks rather than traditional circuit-switched transmission lines. This allows voice transmission over a packet-switched network and provides benefits like cost reduction, toll bypassing, common network infrastructure, and simplified routing administration. VoIP integration with other business tools also allows for unified messaging through voice, email, and fax via the internet on both computers and mobile devices using IP networks. Common VoIP setups involve VoIP phones, analog phones connected to VoIP adapters, and softphones that allow making calls directly from a computer.
The document describes the Session Initiation Protocol (SIP), an application layer protocol for creating, modifying, and terminating multimedia sessions between one or more participants. SIP uses proxy servers to route requests to a user's current location and implement call routing policies. It also provides registration to allow users to upload their location for proxy servers. SIP can run over several transport protocols and is used for Internet telephone calls, multimedia distribution, and multimedia conferences.
The document discusses characterizing an existing internetwork before designing enhancements. It provides details on mapping the logical and physical structure, addressing, wiring, constraints, and health of the network. Key aspects include characterizing protocols, bandwidth utilization, response times, and checking router/switch/firewall status to understand where the network is and where it can be improved. Understanding the existing infrastructure helps ensure new design goals are realistic and identifies where new equipment should be placed.
VoLTE Service Monitoring - VoLTE Voice CallJose Gonzalez
There is currently no accepted standard for the measurement or monitoring of VoLTE Services, even though we believe that this is vital to assure the quality and reliability of such services - and to establish a framework for reliable comparison across implementations.
To this end Ascom has defined a formal definition and implementation strategy to help the Operations team solve a range of challenges, including issues related to EPC, IMS and the Application Server. We will describe this solution in a number of short articles.
This article describes the architecture of our solution and the VoLTE Voice Call test case.
Vodafone is in turnaround mode after cost cuts but still facing revenue declines. It is focusing on growing its data business and subscriber numbers through new devices. Vodafone is concerned about the potential joint venture between Orange and T-Mobile reducing its market share and competitive advantages. It may partner with BT and aggressively target customers to disrupt the scale of the new entity.
Cambium Networks is an industry leader in point-to-multipoint and point-to-point wireless broadband solutions. It has shipped over 3.5 million nodes totaling over $1B to thousands of networks in over 150 countries. Cambium offers uniquely positioned wireless solutions to service providers globally and is a financially healthy and profitable company with strong equity investors. Their solutions include point-to-multipoint access networks and point-to-point backhaul infrastructure operating in the 2.4GHz to 6GHz licensed and unlicensed bands.
E-SIM is an electronic SIM card that replaces the physical SIM card. It allows users to easily switch carriers without inserting a new SIM card. The first devices to use eSIM were the Samsung Gear S2 smartwatch in 2016 and the Apple Watch Series 3. ESIM allows dual SIM functionality on iPhones and makes changing carriers faster and more secure. ESIM provides benefits for IoT applications and connected devices by enabling reliable M2M communication. While eSIM offers advantages like easier roaming and carrier switching, disadvantages include needing to activate each new device's SIM through software.
This project report summarizes a student project to build a cell phone operated robot using dual-tone multi-frequency (DTMF) technology. The robot is designed to be controlled remotely using a cell phone by dialing DTMF tones. The report describes the technology used, including the DTMF standard. It provides block and circuit diagrams of the design, and discusses the software and tools used. It also outlines applications and suggests areas for further improvement, such as adding sensors and security features.
This project report summarizes a student project to build a cell phone operated robot using dual-tone multi-frequency (DTMF) technology. The robot is designed to be remotely controlled by phone calls and can be used for applications in scientific research, military, search and rescue, and recreation. The report describes the technology used, including DTMF signaling and keypad frequencies. It also provides block diagrams, circuit diagrams, and discusses the software and programming tools used. Suggestions are made for further improvements including adding sensors, password protection, and using the robot to call and report alarm notifications.
The document provides information on configuring Cisco routers, including:
- Cisco IOS software uses different command modes to access groups of commands, including user EXEC, privileged EXEC, and configuration modes.
- IP addresses, routing protocols, and other settings are configured in privileged EXEC or configuration modes using commands like interface, ip address, router rip/ospf/eigrp, and more.
- Router and link status can be checked using LED indicators on ports and transceiver modules.
This document compares 3G and 4G mobile technologies. It notes that 3G provides data speeds up to 3.1 Mbps on average, while 4G can provide speeds up to 10 times faster at 100-300 Mbps. It outlines some key differences like 4G supporting higher peak upload/download speeds and quality of service features. Usage statistics are provided showing 3G has over 3 billion users worldwide compared to under 500 million for 4G currently. Potential advantages and drawbacks of both standards are also examined.
VoIP, or Voice over Internet Protocol, is a technology that allows routing of voice data through IP-based networks rather than traditional circuit-switched transmission lines. This allows voice transmission over a packet-switched network and provides benefits like cost reduction, toll bypassing, common network infrastructure, and simplified routing administration. VoIP integration with other business tools also allows for unified messaging through voice, email, and fax via the internet on both computers and mobile devices using IP networks. Common VoIP setups involve VoIP phones, analog phones connected to VoIP adapters, and softphones that allow making calls directly from a computer.
The document describes the Session Initiation Protocol (SIP), an application layer protocol for creating, modifying, and terminating multimedia sessions between one or more participants. SIP uses proxy servers to route requests to a user's current location and implement call routing policies. It also provides registration to allow users to upload their location for proxy servers. SIP can run over several transport protocols and is used for Internet telephone calls, multimedia distribution, and multimedia conferences.
The document discusses characterizing an existing internetwork before designing enhancements. It provides details on mapping the logical and physical structure, addressing, wiring, constraints, and health of the network. Key aspects include characterizing protocols, bandwidth utilization, response times, and checking router/switch/firewall status to understand where the network is and where it can be improved. Understanding the existing infrastructure helps ensure new design goals are realistic and identifies where new equipment should be placed.
VoLTE Service Monitoring - VoLTE Voice CallJose Gonzalez
There is currently no accepted standard for the measurement or monitoring of VoLTE Services, even though we believe that this is vital to assure the quality and reliability of such services - and to establish a framework for reliable comparison across implementations.
To this end Ascom has defined a formal definition and implementation strategy to help the Operations team solve a range of challenges, including issues related to EPC, IMS and the Application Server. We will describe this solution in a number of short articles.
This article describes the architecture of our solution and the VoLTE Voice Call test case.
Vodafone is in turnaround mode after cost cuts but still facing revenue declines. It is focusing on growing its data business and subscriber numbers through new devices. Vodafone is concerned about the potential joint venture between Orange and T-Mobile reducing its market share and competitive advantages. It may partner with BT and aggressively target customers to disrupt the scale of the new entity.
Cambium Networks is an industry leader in point-to-multipoint and point-to-point wireless broadband solutions. It has shipped over 3.5 million nodes totaling over $1B to thousands of networks in over 150 countries. Cambium offers uniquely positioned wireless solutions to service providers globally and is a financially healthy and profitable company with strong equity investors. Their solutions include point-to-multipoint access networks and point-to-point backhaul infrastructure operating in the 2.4GHz to 6GHz licensed and unlicensed bands.
E-SIM is an electronic SIM card that replaces the physical SIM card. It allows users to easily switch carriers without inserting a new SIM card. The first devices to use eSIM were the Samsung Gear S2 smartwatch in 2016 and the Apple Watch Series 3. ESIM allows dual SIM functionality on iPhones and makes changing carriers faster and more secure. ESIM provides benefits for IoT applications and connected devices by enabling reliable M2M communication. While eSIM offers advantages like easier roaming and carrier switching, disadvantages include needing to activate each new device's SIM through software.
This project report summarizes a student project to build a cell phone operated robot using dual-tone multi-frequency (DTMF) technology. The robot is designed to be controlled remotely using a cell phone by dialing DTMF tones. The report describes the technology used, including the DTMF standard. It provides block and circuit diagrams of the design, and discusses the software and tools used. It also outlines applications and suggests areas for further improvement, such as adding sensors and security features.
This project report summarizes a student project to build a cell phone operated robot using dual-tone multi-frequency (DTMF) technology. The robot is designed to be remotely controlled by phone calls and can be used for applications in scientific research, military, search and rescue, and recreation. The report describes the technology used, including DTMF signaling and keypad frequencies. It also provides block diagrams, circuit diagrams, and discusses the software and programming tools used. Suggestions are made for further improvements including adding sensors, password protection, and using the robot to call and report alarm notifications.
Intellectual Property for Sale/License - EGLA COMMUNICATIONSDr. Edwin Hernandez
The package contains three pieces of IP:
1) SafeFi - a patented technology that maps any pattern (e.g. power button pressed repeatedly) to an emergency situation for mobile phones including backend. Software/Patents
2) MobileCDS: Ray tracing simulation - Computer Deterministic Simulation - LOS Indoor/Outdoor.
3) Cloud to Cable TV: softare and patent pending technology that connect HTML/Web Content Sites to distribute with Cable TV and Set Top Boxes.
Pennine Telecom is an established UK telecommunications company with over 30 years of experience. It has 85 staff including 37 engineers. It provides a wide range of telecom services including radios, telephone systems, networks, wireless and cellular solutions. It has a large customer base with over 100 customers that have been with Pennine for over 10 years. It offers Motorola MOTOTRBO digital radio systems with features such as encryption, GPS tracking and applications for dispatching, logging and interfacing with telephone systems.
EGLA's Patent and Intellectual Property Portfolio - LicensingDr. Edwin Hernandez
EGLA represents a variety of patents and intellectual property for sale or license to any bidder. Our IP includes : RF Emulation/Simulation Platforms and Patents, Mobility Protocols for 4G, Cloud-based systems for multimedia streaming, Safety Apps/Cloud with patents (SafeFi) and a Hotel Management System.
Andromeda is a digital two-way radio network in the UK that provides nationwide coverage using mobile phone networks. It offers clear communications, GPS tracking, encryption, and other features without the need for expensive infrastructure setup. Customers like security and transportation companies use Andromeda radios for efficient and reliable communication across wide areas.
Guglielmo Marconi is considered the father of radio, experimenting with Hertzian waves in 1894. In 1901, Marconi received the first trans-Atlantic wireless signal. The US military began using wireless signals and data transmission during WWII. In 1971, the first wireless local area network was established at the University of Hawaii. Bluetooth was developed in the 1990s to allow wireless connectivity between devices like phones, computers, and other electronics. New wireless standards like 802.11n are being developed to increase speeds to over 100MB/sec for wireless networks. Security risks on wireless networks can be minimized through encryption and limiting wireless access.
Doordarshan is India's public service broadcaster and one of the largest broadcasting organizations in India in terms of studio and transmitter infrastructure. It began experimental broadcasts in 1959 and became a daily broadcaster in 1965. Doordarshan now broadcasts through nearly 1,400 terrestrial transmitters, reaching over 90% of India's population. It has 46 studios producing television programs and manages production, storage, transmission, and maintenance of channels through departments like studio, ENG section, NLE, OB, earth station, and transmitter.
This document provides an overview of robotics and embedded systems topics, including definitions of key concepts. It discusses embedded systems, robotics, advanced robotics involving various sensors and modules. It also introduces the ATmega16 microcontroller and programming in Arduino. Finally, it covers interfacing technologies like Bluetooth, Zigbee, GPS and ultrasonic sensors with microcontrollers.
IRJET- Implementation of Private GSM Network for Disaster Management and ...IRJET Journal
1. The document describes the implementation of a private GSM network for disaster management using low-cost components like a Raspberry Pi, Software Defined Radio (SDR), and open source software YATE.
2. The network is able to provide communication within a radius of 150 meters and also detect hazardous methane gas levels in sewers using an MQ4 sensor, transmitting the levels over the private network.
3. Testing showed that range could be extended to 350 meters using higher gain antennas and power amplifiers, but signal quality degraded beyond 150-250 meters depending on the antenna setup.
APRAL Telecom is a systems integration company that provides telecommunications solutions and consulting services in the Middle East. It selects the best products suited for customer needs and integrates different solutions. It offers implementation, maintenance, technical support, training, and other services. Some of the solutions it provides include data/voice networks, CCTV and surveillance systems, fiber management, and tactical electronics.
Mobile networks divide geographic areas into hexagonal cells, each with a radio transmitter tower. Cell phones emit signals every 8 seconds to the nearest tower and surrounding towers to inform the cellular exchange of the phone's position within the network. Cell phones are called "cellular" phones because the network is arranged like a human cell structure, with towers at hexagon points.
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionLuca Bongiorni
Open BTS: Emergency GSM Messaging & Monitoring System for Civil Protection is proposed as a solution ready-to-deploy in the event of natural disaster, in that areas where GSM networks are temporarily down.
The document summarizes a presentation on fixed mobile convergence technologies and market forces. It includes an agenda covering topics like FMC and femtocell history/architecture/standards, regulatory issues, solutions from various companies, and IMS and Wi-Fi based FMC solutions. It provides background on network architectures, standards, and technical requirements for voice and video services over wireless networks.
This presentation to the IEEE Computer Society examines new and disruptive developments in the technologies used in homes, commercial buildings, and manufacturing lines to control lighting, HVAC, security, entertainment, appliances, and other devices. It summarized a market research report written for Parks Associates that also examined market drivers and remaining challenges while providing forecasts, company profiles, and descriptions of each of the enabling standards.
This document provides a training report on communication, navigation and surveillance (CNS) systems at Tulihal Airport in Imphal, Manipur. It discusses various CNS components including VHF communication, digital voice recorders, automatic terminal information service, automatic message switching systems, and instrument landing systems. It also includes sections on the training faculty, functions of the Airports Authority of India, and an acknowledgment section.
VHF radio uses frequencies between 30-300 MHz for applications like radio, TV, and two-way communications over short distances. The document discusses VHF propagation characteristics and antennas before introducing the Icom VHF 5061 radio. It has modes for selective calling, emergency calls and ID transmission. Features include detachable front panel, wide frequency range, voice scrambler and enhanced scanning abilities. The radio is suitable for ground-to-air, public safety and business communications.
This presentation discusses the evolution of mobile technology across generations. It begins with 0G analog cellular systems in the 1940s-1960s and the first digital 1G systems in the 1970s. 2G systems in the 1980s brought digital signals and SMS. 3G in the late 1990s allowed broadband capabilities up to 2Mbps. 4G aims to provide even faster speeds up to 100Mbps, be more reliable and cost effective, and support new applications through its integrated support of technologies like Bluetooth, WiFi and ad hoc networks.
Mobile wireless evolution began with analog 1G networks in the 1980s using Frequency Division Multiple Access (FDMA). 1G systems used analog signals and large frequency bandwidths. Later, 2G digital networks in the 1990s provided more efficient use of spectrum through digital modulation, speech coding, and Time Division Multiple Access (TDMA). Code Division Multiple Access (CDMA) was then introduced in the mid-1990s and supported many more users through spread spectrum technology.
Similar to Broadcast Signal Intrusion - Hacking Radio Stations (20)
Digital Signage Systems - The Modern Hacker's OutreachZero Science Lab
The document provides information on several digital signage systems and related security issues, including:
1) Eight cases of vulnerabilities found in different digital signage systems are described, such as remote code execution, SQL injection, authentication bypass, and more.
2) Common attack vectors for digital signage systems are explained, including exposed management interfaces, known vulnerabilities, default or hard-coded credentials, lack of authentication and authorization, and more.
3) Details are given on specific exploits against systems like Cayin, QiHang Media, UBICOD Medivision, and others, demonstrating privilege escalation, unauthorized file access and deletion, and in some cases gaining full remote code execution.
The document analyzes the cybersecurity of 5 building management system (BMS) components from 4 vendors. It finds that a significant number of BMS devices are directly accessible from the internet, and the components share common design flaws like default credentials, lack of input sanitization, and insecure firmware updates. The research uncovered over 100 vulnerabilities in total, demonstrating how an attacker could achieve unauthenticated remote code execution on the systems and potentially impact over 10 million people. It recommends vendors improve security standards for BMS products.
Exploitation and distribution of setuid and setgid binaries on Linux systemsZero Science Lab
Abstract—In an era of internet freedom, lack of control and supervision, every system is exposed to various attackers and malicious users which, given the right circumstances, are able to cause colossal damage. A single security vulnerability can be the reason for a business’ downfall, therefore significant attention needs to be paid to said systems’ security to avoid such issues. Unix-like filesystems define certain access rights flags, named setuid and setgid, which allow users to execute files with the permissions of the file’s owner or group. This can be exploited to gain unprivileged access using buffer overflow attacks. I performed tests by running a script to collect the files in Ubuntu, Debian, Slackware, Fedora and CentOS to find the files with the setuid and setgid bits set. My aim is to determine which distribution is the most secure one and whether Slackware, considering it’s known for its’ secure design and characteristics, will prove its’ reputation. The results show that Debian and CentOS have e least amount of exploitable binaries, while Slackware and Fedora have the most.
Web Vulnerabilities And Exploitation - Compromising The WebZero Science Lab
One of the main problems of all big companies is how their applications are secured from cyber attacks. New types of vulnerabilities and attack vectors are being developed every day, therefore they pose a potential threat to all applications that rely on some kind of web technology. This document explains the most common and most dangerous web attacks as well as techniques how to secure your infrastructure from being compromised. We focus on SQL injections, XSS, CSRF, RFI/LFI and Server Side Includes. We discuss the attack vectors of web vulnerabilities and exploitation schemas. However, regardless of the security measures taken and defenses being deployed, there will always be a way in. Nevertheless, security analysis provide a valuable insight that can grant the advantage over said attackers and allow us to stay one step ahead.
This document contains the results of a second comparative penetration test conducted by a team of security specialists at Zero Science Lab against two cloud-based Web Application Firewall (WAF) solutions: Incapsula and Cloudflare. This test was designed to bypass security controls in place, in any possible way, circumventing whatever filters they have. Given the rise in application-level attacks, the goal of the test was to provide IT managers of online businesses with a comparison of these WAFs against real-world threats in simulated real-world conditions.
This document contains the results of a comparative penetration test conducted by a team of security specialists at Zero Science Lab against three ‘leading’ web application firewall solutions. Our goal was to bypass security controls in place, in any way we can, circumventing whatever filters they have. This report also outlines the setup and configuration process, as well as a detailed security assessment.
Преоптоварување на баферот и безбедносни механизми на меморијата PPTZero Science Lab
Заштитата на податоците отсекогаш била важна, уште од минатото се користеле одредени алгоритми за шифрирање со цел информациите да бидат прочитани само од лицето за кое што биле наменети т.е лицето кое што го поседувал клучот за дешифрирање.
Преоптоварување на баферот и безбедносни механизми на меморијатаZero Science Lab
Преоптоварување на баферот претставува компјутерски пропуст како резултат на внесување низа на карактери во бафер преку функции кои не ги проверуваат границите на бројот на дозволени карактери што можат да бидат внесени. Структурираниот справувач со испади или SEH претставува механизам имплементиран во Microsoft Windows оперативните системи којшто претставува податочна структура т.е поврзана листа составена од најмалце едно поле во кое се сместени податоци и еден покажувач кон следниот елемент. ASLR механизмот е имплементиран кај Linux и Windows оперативните системи, и овозможува случајност на адресите (адресниот простор). DEP или ‘Data Execution Prevention’ претставува механизам со хардверска и софтверска имплементација за спречување на извршување на инструкции во делови од меморијата зададени од напаѓачот
This document provides an overview of the Open Web Application Security Project (OWASP) Bulgaria chapter. It introduces the chapter leader and discusses OWASP's mission to improve software security. The document outlines membership benefits and encourages participation in OWASP projects and events. It also summarizes the OWASP Top 10 project, which identifies the most critical web application security risks.
Grsecurity - Theoretical and Practical ApplicationZero Science Lab
This document discusses GRSECURITY and PAX, which are Linux kernel security patches that provide protections against memory corruption bugs and exploits. Some key features include PaX, which implements address space layout randomization and W^X protections, as well as role-based access control and enhanced auditing. The patches contain options for detection, prevention, and protection of the address space against modification.
Maximiliano Soler gives a presentation on using Google to gather information without sophisticated mechanisms. He demonstrates how to use Google search operators ("dorks") to find vulnerable products, error messages, sensitive files and passwords, foot holds for access, and more. He recommends securing servers and applications, disabling directory browsing, not publishing sensitive info without authentication, and analyzing website search traffic for security.
"IOS 18 CONTROL CENTRE REVAMP STREAMLINED IPHONE SHUTDOWN MADE EASIER"Emmanuel Onwumere
In iOS 18, Apple has introduced a significant revamp to the Control Centre, making it more intuitive and user-friendly. One of the standout features is a quicker and more accessible way to shut down your iPhone. This enhancement aims to streamline the user experience, allowing for faster access to essential functions. Discover how iOS 18's redesigned Control Centre can simplify your daily interactions with your iPhone, bringing convenience right at your fingertips.
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalRPeter Gallagher
In this session delivered at NDC Oslo 2024, I talk about how you can control a 3D printed Robot Arm with a Raspberry Pi, .NET 8, Blazor and SignalR.
I also show how you can use a Unity app on an Meta Quest 3 to control the arm VR too.
You can find the GitHub repo and workshop instructions here;
https://bit.ly/dotnetrobotgithub
2. Gjoko Krstic
• Founder of Zero Science Lab2
• Offensive security research lead at ING
• Member of g00g00tka group
• Cybernetics student ☺
2
3. AGENDA
• Introduction
• Radio Station Components
• Broadcast Signal Intrusion
• ZSL Method
• Conclusion
• End of Transmission
3
4. 4
Guglielmo Marconi, an Italian inventor and
electrical engineer, is credited with the invention
of the radio in 1894 and demonstrated in 1895.
He continued to develop and improve his system,
and in 1901 he successfully transmitted the first
transatlantic radio signal.
Alexander Graham Bell, an American inventor,
scientist, and teacher of the deaf, is also
considered one of the pioneers of radio
technology. He developed an early version of the
radio, which he called the "photophone," that
used light waves to transmit sound.
BRIEF HISTORY
5. 5
BROADCAST TYPES
STREAMING/WEB TRADITIONAL AM/FM SATELLITE/DAB
Internet radio, which allows
listeners to stream audio
over the internet.
AM (Amplitude Modulation)
radio, which is the traditional
type of radio broadcasting and
uses variations in the amplitude
(or strength) of a radio wave to
transmit sound.
FM (Frequency Modulation)
radio, which uses variations in
the frequency of a radio wave
to transmit sound. FM radio
generally provides better sound
quality than AM radio.
Satellite radio, which is a
subscription-based service
that uses a network of
satellites to transmit radio
signals.
HD Radio, which is a digital
technology that allows FM
and AM stations to
broadcast additional
channels and data
alongside their traditional
analog signals.
6. 1. MICROPHONE OR AUDIO SOURCE: THIS IS WHERE THE AUDIO CONTENT ORIGINATES, IT
COULD BE A LIVE SHOW, PRE-RECORDED CONTENT, OR A STREAMING SERVICE.
2. AUDIO PROCESSOR: THIS DEVICE IS RESPONSIBLE FOR PROCESSING THE AUDIO
SIGNALS, SUCH AS ADJUSTING THE VOLUME, EQUALIZATION, AND COMPRES SION.
3. MODULATOR: THIS DEVICE IS RESPONSIBLE FOR MODULATING THE AUDIO SIGNALS
ONTO A CARRIER FREQUENCY USING TECHNIQUES SUCH AS FM OR AM.
4. TRANSMITTER: THIS DEVICE AMPLIFIES THE MODULATED SIGNAL AND TRANSMITS IT
VIA AN ANTENNA.
5. ANTENNA: THIS DEVICE IS USED TO RADIATE THE RADIO WAVES INTO THE AIR.
6. RECEIVER: THIS IS THE DEVICE THAT RECEIVES THE RADIO WAVES AND DEMODULATE S
THEM TO EXTRACT THE ORIGINAL AUDIO SIGNALS. THIS CAN BE A STANDA LONE RADIO
RECEIVER OR A BUILT-IN RECEIVER IN A CAR, SMARTPHONE, OR OTHER DEVICE.
7. AUDIO AMPLIFIER AND SPEAKERS: THIS DEVICE AMPLIFIES THE AUDIO SIGNAL AND
PLAYS THE SOUND VIA SPEAKERS.
6
TYPICAL RADIO COMPONENTS
16. BROADCAST SIGNAL INTRUSION
Broadcast signal intrusion is the unauthorized alteration
or takeover of a broadcast signal. This can occur on
television or radio broadcasts and can take many forms.
Digital intrusion is more sophisticated and can include
hacking into a station's computer systems to gain
control of the signal, or intercepting and modifying the
signal as it is being transmitted.
16
27. 27
WHAT IS DAB?
WHAT IS RDS?
DAB (Digital Audio Broadcasting) is a digital radio standard that uses a different
modulation method compared to FM and AM. DAB uses a technique called
COFDM (Coded Orthogonal Frequency-Division Multiplexing) to modulate the
audio signals onto a carrier frequency. DAB also can transmit additional data,
such as station information, song titles and traffic reports, but it uses a different
method to transmit this data, it uses the DAB EPG (Electronic Program Guide)
that allows for the transmission of more advanced information than RDS.
RDS (Radio Data System) is a technology that is primarily used for FM radio, it
allows for the transmission of additional data, such as song titles, station
information, and traffic reports, over FM radio waves.
28. Case #13 – Adtec Digital
Digital Video Broadcasting (DVB)
29. Flexible and powerful, it ensures perfect sound
quality and full compatibility with radio
broadcasting standards and can be used
simultaneously for FM and HD, DAB, DRM or
streaming.
29
RADIO PROCESSING
31. Many audio processors and other IoT
devices come with built-in web
interfaces or APIs that allow for
remote management and control, and
software such as "Remote Control"
can be used to access these
interfaces. This can be useful for
adjusting settings, monitoring the
performance of the equipment, and
troubleshooting problems remotely.
32. VECTORS [BLACKBOX]
• The network-connected device
- Web interface (PHP, CGI, Shell scripts), HTTP
- Telnet: Link&Share terminal server
- ELF32 binaries (Linux/ARM)
- Firmware?
• The software (thick client), Windows 10
- SOUND4 Server.exe (64bit)
- SOUND4 Remote Control.exe (32bit)
- LinkAndShare Transmitter.exe (32bit)
32
35. RESULTS
• 25 0-days and counting
• 107 radio stations affected
• No response from the vendor(s)
• Collab with national CERTs and VINCE (CISA)
• CVEs pending… but we don’t care about that
35
51. NEWS FLASH FROM THE AI
WHAT IF THE AUDIO PROCESSOR AS AN IOT DEVICE GETS HACKED, CAN TH E
HACKER TAKE OVER A BROADCAST SIGNAL ?
“If an audio processor is hacked, it is possible that the hacker could
take over the broadcast signal. Depending on the specific device and
the level of access gained by the hacker, they could potentially modify
the audio content, disrupt the transmission, or even gain control over
the entire broadcast system.
However, it's important to note that these kind of hacks are not easy to
carry out and would require a high level of technical knowledge and
skill. Additionally, most IoT devices have some form of security
measures in place to prevent unauthorized access, such as firewalls,
encryption and authentication.”
51
52. …
if (isset($_POST['username']) && isset($_POST['password'])) {
$ret = -1;
exec('echo ' . $_POST['password'] . ' | /opt/sound4/sound4server
_check_pwd_ ' .'"'.$_POST['username'].'";',$out,$ret);
…
52
FIRMWARE GLIMPSE: WEB GI
(login.php)
53. VULNERABILITIES!
Privilege Escalation
Cross-Site Request Forgery
Authorization Bypass
Denial of Service
Authentication Bypass
ICMP Flood Attack
Information Disclosure
Command Injection
SQL Injection
Cross-Site Scripting
Directory Traversal
Pre-auth Factory Reset
Stack-based Buffer Overflow
Default Credentials
Hard-coded Credentials
Cleartext Storage and Communication
Vulnerable Libraries/Binaries
Broadcast Signal Hijacking
55. 55
JUST ANOTHER SHOUTOUT
• Radio and broadcast signal intrusion is a serious security
concern that can disrupt communications and cause
confusion and panic among the public.
• Security is often overlooked in the radio and
broadcast industry, leaving exposed devices and
components online and vulnerable to attack.
• IoT vendors need to have more awareness about
security and include security in their software
development life cycle (SDLC) pipeline to
prevent vulnerabilities from being introduced in
their products.