The document discusses the use of radio attacks in security testing, focusing on pentests and red team operations. It covers various attack methods including Wi-Fi, mobile devices, and RFID, emphasizing the importance of preparing intrusions with mapping and understanding security protocols. Key tools and techniques are highlighted, along with practical insights from experiences in France and broader Europe.
Related topics: