Ask Your Question

Malicious broadcast or signal hack: What to look for?

asked 2019-03-07 19:27:50 +0000

punctum gravatar image

Has anyone used Wireshark to forensically prove a signal hack, for example, a rogue broadcast via TV transmitter or using a Yagi WiFi antenna?

Seems like any data that is conveyed in this way and that is heard/seen on a device should leave some artifact or packet information. Has anyone been able to pin down this type of malicious behavior using Wireshark or some packet filtering process?


edit retag flag offensive close merge delete

1 Answer

Sort by ยป oldest newest most voted

answered 2019-03-14 20:06:02 +0000

Kurt Knochner gravatar image

updated 2019-03-14 20:06:23 +0000

Has anyone used Wireshark to forensically prove a signal hack

no, I have not and based on your assumption to use a TV transmitter, Wireshark is the wrong tool for such an endeavor.

The reasons are:

  1. You need a capture device that is able to capture TV signals.
  2. You need a decoder that can decode 'TV signals'. Wireshark does not have such a decoder.
  3. Wireshark was mainly built to dissect Ethernet/IP packet. While it can dissect a lot of other protocols now, why do you assume, that such a uber attacker would use a known encoding scheme, when he want's to leak data via a TV signal

Long story short: I'm sorry, but there is no way to use Wireshark for the type of forensic analysis you described.


edit flag offensive delete link more

Your Answer

Please start posting anonymously - your entry will be published after you log in or create a new account.

Add Answer

Question Tools

1 follower


Asked: 2019-03-07 19:27:50 +0000

Seen: 407 times

Last updated: Mar 14 '19