About the talk
There is very little publicly available on working with Z-Wave technology. Speaker presented the tools that can be used to examine how Z-Wave works and explained the security and encryption it uses. Through this journey, speaker saw how it became apparent that the new Z-Wave security standard – S2 – allows a trivial downgrade the older, vulnerable S0 standard. This allows us to intercept keys and command any device on the network. Speaker presented a critique of the Z-Wave standard, highlighting important differences between marketing and reality, leading to the weakening of security for users of the system.
Security Consultant at Pen Test Partners