SlideShare ist ein Scribd-Unternehmen logo
1 von 53
Downloaden Sie, um offline zu lesen
Honey, IHoney, IHoney, IHoney, IHoney, IHoney, IHoney, IHoney, I’’’’’’’’m Home!!m Home!!m Home!!m Home!!m Home!!m Home!!m Home!!m Home!!
Hacking ZHacking Z--Wave Home Automation SystemsWave Home Automation Systems
Behrang Fouladi, SensePost UK
Sahand Ghanoun
HomeHome
AutomationAutomation
Central
Control
Entry
Control
Smart
Appliances
Home
Entertainment
System
Lighting
Home
Security
CCTV
Sensors
HVAC
Family Guy from Fox Broadcasting Company
Convenience
Accessibility
Security
Energy Management
Remote Monitoring & Control
Z-Wave devices to be shipped in 2013
5 million
How Does It Work?How Does It Work?
Wireless
AES-128 WPA/WPA2
E0
Power Line Dual Band
Proprietary
AES-128
Door Lock
Door/Window Sensor
Motion Sensor
Siren
Exploitation Framework
Joshua Wright. 2009.
Zigbee Wardriving Kit
Travis GoodSpeed. 2012.
Pen Testing Over Power Lines
Dave Kennedy, Rob Simon. 2011.
Why ZWhy Z--Wave?Wave?
According to Z-Wave Alliance…
80% of US home security market is Z-Wave
2012 NAHB survey shows…
Wireless home security tops homeowners’ wishlist
Proprietary protocol
No public research so far...
ZZ--WaveWave
ProtocolProtocol
Physical
Transport
Network
Application
Security
Error Detection & Retransmission
Acknowledgment
32-bit Home ID
8-bits Node ID
Mesh Network
Topology Discovery
Automatic Healing
Encryption, Anti-replay and MAC
Device specific commands & parameters 
Physical
868.42 (EU) / 908.42 (US) MHz
9.6/40/100 KbpsPhysical
ZZ--Wave Protocol StackWave Protocol Stack
RF ConfigurationsRF Configurations
FSK Modulation
9.6/40 kbps
868.42/40 MHz (EU)
±20 KHz
Manchester/NRZ
Texas Instruments CC1110Texas Instruments CC1110
SubSub--1 GHz RF 1 GHz RF transcievertransciever SoCSoC
Supports ZSupports Z--Wave configurationsWave configurations
Communication via serialCommunication via serial
SmartRFSmartRF Studio ToolStudio Tool
ITU-T Rec. G.9959
We identified inconsistencies with
the actual implementation!
ZZ--Wave Frame FormatWave Frame Format
PHY Frame
Singlecast
MAC Frame
Application
Frame
ZZ--ForceForce
Packet
needed to do network discovery
I Like toI Like to
Move It!!Move It!!
Live DemoLive Demo
ZZ--WaveWave
SecuritySecurity
Encryption:
AES-OFB
Message Freshness:
64-bit Nonce
Data Authentication:
AES-CBCMAC
128-bit Random Network Key: Kn
Custom
Key Establishment Protocol
128-bit Cipher & MAC 
Keys: Derived From Kn
Custom
Key Establishment Protocol
Get ready for key establishment
Ready
Nonce request
Nonce value 
Encrypted network key – Kn
Nonce request
Nonce value 
Encrypted message (new key is set)
Encrypt & 
MAC by K0
Encrypt & 
MAC by Kn
Get ready for key establishment
Ready
Nonce request
Nonce value 
Encrypted network key – Kn
Nonce request
Nonce value 
Encrypted message (new key is set)
Encrypt & 
MAC by K0
Encrypt & 
MAC by Kn
Protocol VulnerabilitiesProtocol Vulnerabilities
Passive attack:Passive attack:
Intercept and decrypt the Intercept and decrypt the ““set keyset key”” messagemessage
Happens at system installation time inHappens at system installation time in ““low power transmissionlow power transmission”” modemode
Passive attack:Passive attack:
Intercept and decrypt the Intercept and decrypt the ““set keyset key”” messagemessage
Happens at system installation time inHappens at system installation time in ““low power transmissionlow power transmission”” modemode
With With ““whomwhom”” key is being key is being 
established?established?
With someone who knowsWith someone who knows……
temporary key valuetemporary key value
andand……
……key derivation functionskey derivation functions
)(
)(
mKm
cKc
PasswdECBAESK
PasswdECBAESK
n
n
}0]{16[0 byteK
)||||||||
,(
),(
CLENDSTSRCSH
IVCBCMACAESMAC
PIVOFBAESC
m
c
K
K
Unauthorized Key ResetUnauthorized Key Reset
Attack?Attack?
Honey,Honey,
II’’m Home!!m Home!!
Live DemoLive Demo
Image from boratmakeglorioustributeactto.com
Hmm... Now What?Hmm... Now What?
Critical vulnerability… needs an urgent fix!
Short-term fix (OTA)
Check current key state before it’s set
Actual fix (Next Gen)
Public key cryptography and authentication
More technical detail in our More technical detail in our 
White PaperWhite Paper
Thank You!Thank You!
Behrang FouladiBehrang Fouladi
BehrangFouladi
Sahand GhanounSahand Ghanoun
Sahand__

Weitere ähnliche Inhalte

Was ist angesagt?

Is the Smart Home fit for purpose?
Is the Smart Home fit for purpose? Is the Smart Home fit for purpose?
Is the Smart Home fit for purpose? Thom. Poole
 
Pros and cons of Smart Home Systems
Pros and cons of Smart Home SystemsPros and cons of Smart Home Systems
Pros and cons of Smart Home SystemsSadiaBU
 
Smart home in the insurance industry
Smart home in the insurance industrySmart home in the insurance industry
Smart home in the insurance industrymarkusmanniic
 
Smart home solution
Smart home solutionSmart home solution
Smart home solutiontipo-lab
 
Home automation system
Home automation systemHome automation system
Home automation systemRaadSabah
 
Arduino Smart Home Automation Controller
Arduino Smart Home Automation ControllerArduino Smart Home Automation Controller
Arduino Smart Home Automation ControllerOishik Sarkar
 
Application of ai in home automation
Application of ai in home automationApplication of ai in home automation
Application of ai in home automationBharadwaj Sharma
 
Smart home applications
Smart home applicationsSmart home applications
Smart home applicationsOmarTashkandi1
 
Smart house (Move to Easy Life)
Smart house (Move to Easy Life)Smart house (Move to Easy Life)
Smart house (Move to Easy Life)chirag thakkar
 
Smart home applications in daily life
Smart home applications in daily lifeSmart home applications in daily life
Smart home applications in daily lifeSugata Mondal
 
Smart home
Smart homeSmart home
Smart homeNhat Loc
 
Home automation using raspberry pi
Home automation using raspberry piHome automation using raspberry pi
Home automation using raspberry pidnp99
 
Talk on Home Automation & IoT - PhaseShift 2016 - BMS - With QA & Event Pics
Talk on Home Automation & IoT - PhaseShift 2016 - BMS - With QA & Event PicsTalk on Home Automation & IoT - PhaseShift 2016 - BMS - With QA & Event Pics
Talk on Home Automation & IoT - PhaseShift 2016 - BMS - With QA & Event PicsRitesh Nagpal
 
Home automation in kerala | home automation in calicut | Smart home solutions...
Home automation in kerala | home automation in calicut | Smart home solutions...Home automation in kerala | home automation in calicut | Smart home solutions...
Home automation in kerala | home automation in calicut | Smart home solutions...Arun Kumar
 

Was ist angesagt? (20)

Is the Smart Home fit for purpose?
Is the Smart Home fit for purpose? Is the Smart Home fit for purpose?
Is the Smart Home fit for purpose?
 
Pros and cons of Smart Home Systems
Pros and cons of Smart Home SystemsPros and cons of Smart Home Systems
Pros and cons of Smart Home Systems
 
Smart home in the insurance industry
Smart home in the insurance industrySmart home in the insurance industry
Smart home in the insurance industry
 
Smart home solution
Smart home solutionSmart home solution
Smart home solution
 
Home automation system
Home automation systemHome automation system
Home automation system
 
Arduino Smart Home Automation Controller
Arduino Smart Home Automation ControllerArduino Smart Home Automation Controller
Arduino Smart Home Automation Controller
 
Smart home
Smart homeSmart home
Smart home
 
Application of ai in home automation
Application of ai in home automationApplication of ai in home automation
Application of ai in home automation
 
Smart Home Devices
Smart Home DevicesSmart Home Devices
Smart Home Devices
 
Smarthome
SmarthomeSmarthome
Smarthome
 
Smart home solution
Smart home solutionSmart home solution
Smart home solution
 
Smart home
Smart homeSmart home
Smart home
 
Smart home applications
Smart home applicationsSmart home applications
Smart home applications
 
Smart house (Move to Easy Life)
Smart house (Move to Easy Life)Smart house (Move to Easy Life)
Smart house (Move to Easy Life)
 
Smart home applications in daily life
Smart home applications in daily lifeSmart home applications in daily life
Smart home applications in daily life
 
Smart home
Smart homeSmart home
Smart home
 
Home automation using raspberry pi
Home automation using raspberry piHome automation using raspberry pi
Home automation using raspberry pi
 
Talk on Home Automation & IoT - PhaseShift 2016 - BMS - With QA & Event Pics
Talk on Home Automation & IoT - PhaseShift 2016 - BMS - With QA & Event PicsTalk on Home Automation & IoT - PhaseShift 2016 - BMS - With QA & Event Pics
Talk on Home Automation & IoT - PhaseShift 2016 - BMS - With QA & Event Pics
 
Home automation in kerala | home automation in calicut | Smart home solutions...
Home automation in kerala | home automation in calicut | Smart home solutions...Home automation in kerala | home automation in calicut | Smart home solutions...
Home automation in kerala | home automation in calicut | Smart home solutions...
 
Smart home presentation
Smart home presentationSmart home presentation
Smart home presentation
 

Andere mochten auch

AWS Survival Guide
AWS Survival GuideAWS Survival Guide
AWS Survival GuideKen Johnson
 
ZWave Lock Programming
ZWave Lock ProgrammingZWave Lock Programming
ZWave Lock Programmingg4elan
 
Home Automation Products and Suppliers in UAE
Home Automation Products and Suppliers in UAEHome Automation Products and Suppliers in UAE
Home Automation Products and Suppliers in UAEBeatriz john
 
Presentation Smart Home With Home Automation
Presentation Smart Home With Home AutomationPresentation Smart Home With Home Automation
Presentation Smart Home With Home AutomationArifur Rahman
 
Home Automation with Asterisk - Astricon 2015 - Alberto Sagredo Castro
Home Automation with Asterisk - Astricon 2015 - Alberto Sagredo CastroHome Automation with Asterisk - Astricon 2015 - Alberto Sagredo Castro
Home Automation with Asterisk - Astricon 2015 - Alberto Sagredo CastroAlberto Sagredo Castro
 
Home automation ppt-kamal lamichhane
Home automation ppt-kamal lamichhaneHome automation ppt-kamal lamichhane
Home automation ppt-kamal lamichhaneKamal Lamichhane
 
Poster for Development of solar drier for post harvest treatment
Poster for Development of solar drier for post harvest treatmentPoster for Development of solar drier for post harvest treatment
Poster for Development of solar drier for post harvest treatmentSumit Dharmarao
 
Home automation for humans
Home automation for humansHome automation for humans
Home automation for humansGordon Meyer
 
Solar Dryer & Solar Distillation
Solar Dryer & Solar DistillationSolar Dryer & Solar Distillation
Solar Dryer & Solar DistillationSmit Shah
 
Orange Home Automation Infrastructure – open interaction from the Cloud - Jea...
Orange Home Automation Infrastructure – open interaction from the Cloud - Jea...Orange Home Automation Infrastructure – open interaction from the Cloud - Jea...
Orange Home Automation Infrastructure – open interaction from the Cloud - Jea...mfrancis
 
Various Drying methods for food application
Various Drying methods for food application Various Drying methods for food application
Various Drying methods for food application Abirami Nadarajan
 
Visualization of big time series data
Visualization of big time series dataVisualization of big time series data
Visualization of big time series dataRob Hyndman
 
Home Automation over Internet
Home Automation over InternetHome Automation over Internet
Home Automation over InternetRakesh Chintha
 
Tutorial 6 queues & arrays & results recording
Tutorial 6   queues & arrays & results recording Tutorial 6   queues & arrays & results recording
Tutorial 6 queues & arrays & results recording Mohd Batati
 
Comparison of MQTT and DDS as M2M Protocols for the Internet of Things
Comparison of MQTT and DDS as M2M Protocols for the Internet of ThingsComparison of MQTT and DDS as M2M Protocols for the Internet of Things
Comparison of MQTT and DDS as M2M Protocols for the Internet of ThingsReal-Time Innovations (RTI)
 

Andere mochten auch (20)

AWS Survival Guide
AWS Survival GuideAWS Survival Guide
AWS Survival Guide
 
ZWave Lock Programming
ZWave Lock ProgrammingZWave Lock Programming
ZWave Lock Programming
 
Home Automation Products and Suppliers in UAE
Home Automation Products and Suppliers in UAEHome Automation Products and Suppliers in UAE
Home Automation Products and Suppliers in UAE
 
Presentation Smart Home With Home Automation
Presentation Smart Home With Home AutomationPresentation Smart Home With Home Automation
Presentation Smart Home With Home Automation
 
Home Automation with Asterisk - Astricon 2015 - Alberto Sagredo Castro
Home Automation with Asterisk - Astricon 2015 - Alberto Sagredo CastroHome Automation with Asterisk - Astricon 2015 - Alberto Sagredo Castro
Home Automation with Asterisk - Astricon 2015 - Alberto Sagredo Castro
 
Presentation on home automation
Presentation on home automationPresentation on home automation
Presentation on home automation
 
Home automation ppt-kamal lamichhane
Home automation ppt-kamal lamichhaneHome automation ppt-kamal lamichhane
Home automation ppt-kamal lamichhane
 
Poster for Development of solar drier for post harvest treatment
Poster for Development of solar drier for post harvest treatmentPoster for Development of solar drier for post harvest treatment
Poster for Development of solar drier for post harvest treatment
 
Home automation for humans
Home automation for humansHome automation for humans
Home automation for humans
 
A Brief History of Home Automation
A Brief History of Home AutomationA Brief History of Home Automation
A Brief History of Home Automation
 
Solar Dryer & Solar Distillation
Solar Dryer & Solar DistillationSolar Dryer & Solar Distillation
Solar Dryer & Solar Distillation
 
Orange Home Automation Infrastructure – open interaction from the Cloud - Jea...
Orange Home Automation Infrastructure – open interaction from the Cloud - Jea...Orange Home Automation Infrastructure – open interaction from the Cloud - Jea...
Orange Home Automation Infrastructure – open interaction from the Cloud - Jea...
 
final ppt
final pptfinal ppt
final ppt
 
make home automation
make home automationmake home automation
make home automation
 
Various Drying methods for food application
Various Drying methods for food application Various Drying methods for food application
Various Drying methods for food application
 
Visualization of big time series data
Visualization of big time series dataVisualization of big time series data
Visualization of big time series data
 
Solar dryer
Solar dryerSolar dryer
Solar dryer
 
Home Automation over Internet
Home Automation over InternetHome Automation over Internet
Home Automation over Internet
 
Tutorial 6 queues & arrays & results recording
Tutorial 6   queues & arrays & results recording Tutorial 6   queues & arrays & results recording
Tutorial 6 queues & arrays & results recording
 
Comparison of MQTT and DDS as M2M Protocols for the Internet of Things
Comparison of MQTT and DDS as M2M Protocols for the Internet of ThingsComparison of MQTT and DDS as M2M Protocols for the Internet of Things
Comparison of MQTT and DDS as M2M Protocols for the Internet of Things
 

Mehr von SensePost

objection - runtime mobile exploration
objection - runtime mobile explorationobjection - runtime mobile exploration
objection - runtime mobile explorationSensePost
 
Vulnerabilities in TN3270 based Application
Vulnerabilities in TN3270 based ApplicationVulnerabilities in TN3270 based Application
Vulnerabilities in TN3270 based ApplicationSensePost
 
Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17SensePost
 
Introducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration ToolkitIntroducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration ToolkitSensePost
 
ZaCon 2015 - Zombie Mana Attacks
ZaCon 2015 - Zombie Mana AttacksZaCon 2015 - Zombie Mana Attacks
ZaCon 2015 - Zombie Mana AttacksSensePost
 
Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22SensePost
 
Heartbleed Overview
Heartbleed OverviewHeartbleed Overview
Heartbleed OverviewSensePost
 
Botconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server DetectionBotconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server DetectionSensePost
 
Rat a-tat-tat
Rat a-tat-tatRat a-tat-tat
Rat a-tat-tatSensePost
 
Offence oriented Defence
Offence oriented DefenceOffence oriented Defence
Offence oriented DefenceSensePost
 
Threats to machine clouds
Threats to machine cloudsThreats to machine clouds
Threats to machine cloudsSensePost
 
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemInside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemSensePost
 
SNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSensePost
 
Its Ok To Get Hacked
Its Ok To Get HackedIts Ok To Get Hacked
Its Ok To Get HackedSensePost
 
Web Application Hacking
Web Application HackingWeb Application Hacking
Web Application HackingSensePost
 
Putting the tea back into cyber terrorism
Putting the tea back into cyber terrorismPutting the tea back into cyber terrorism
Putting the tea back into cyber terrorismSensePost
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summarySensePost
 
Attacks and Defences
Attacks and DefencesAttacks and Defences
Attacks and DefencesSensePost
 
Corporate Threat Modeling v2
Corporate Threat Modeling v2Corporate Threat Modeling v2
Corporate Threat Modeling v2SensePost
 
State of the information security nation
State of the information security nationState of the information security nation
State of the information security nationSensePost
 

Mehr von SensePost (20)

objection - runtime mobile exploration
objection - runtime mobile explorationobjection - runtime mobile exploration
objection - runtime mobile exploration
 
Vulnerabilities in TN3270 based Application
Vulnerabilities in TN3270 based ApplicationVulnerabilities in TN3270 based Application
Vulnerabilities in TN3270 based Application
 
Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17
 
Introducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration ToolkitIntroducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration Toolkit
 
ZaCon 2015 - Zombie Mana Attacks
ZaCon 2015 - Zombie Mana AttacksZaCon 2015 - Zombie Mana Attacks
ZaCon 2015 - Zombie Mana Attacks
 
Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22
 
Heartbleed Overview
Heartbleed OverviewHeartbleed Overview
Heartbleed Overview
 
Botconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server DetectionBotconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server Detection
 
Rat a-tat-tat
Rat a-tat-tatRat a-tat-tat
Rat a-tat-tat
 
Offence oriented Defence
Offence oriented DefenceOffence oriented Defence
Offence oriented Defence
 
Threats to machine clouds
Threats to machine cloudsThreats to machine clouds
Threats to machine clouds
 
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemInside .NET Smart Card Operating System
Inside .NET Smart Card Operating System
 
SNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) Pwnage
 
Its Ok To Get Hacked
Its Ok To Get HackedIts Ok To Get Hacked
Its Ok To Get Hacked
 
Web Application Hacking
Web Application HackingWeb Application Hacking
Web Application Hacking
 
Putting the tea back into cyber terrorism
Putting the tea back into cyber terrorismPutting the tea back into cyber terrorism
Putting the tea back into cyber terrorism
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summary
 
Attacks and Defences
Attacks and DefencesAttacks and Defences
Attacks and Defences
 
Corporate Threat Modeling v2
Corporate Threat Modeling v2Corporate Threat Modeling v2
Corporate Threat Modeling v2
 
State of the information security nation
State of the information security nationState of the information security nation
State of the information security nation
 

Kürzlich hochgeladen

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Kürzlich hochgeladen (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Hacking Z-Wave Home Automation Systems