Which brings me to part two, MeshMarauder.
An open source tool demonstrating proof-of-concept exploits against the DEFCON 33 Meshtastic firmware.
MeshMarauder will demostrate:
- Tracking user activity on any mesh regardless of encryption usage
- Hijack all meshtastic user profile metadata
- Change any users public key
- Send messages as any user in channel chats that appear authentic
- MITM direct messages
https://meshmarauder.net
#defcon #meshtastic #meshmarauder #cybersecurity
That release mitigates a previous issue, where different devices would sometimes generate identical secret keys due to lack of entropy in their random number generation.
That release mitigates a previous issue, where different devices would sometimes generate identical secret keys due to lack of entropy in their random number generation.
This is their response to the issues which this post is about.