Low range wireless attacks replication

Description
Window of opportunity is an important factor when it comes to threat analysis and risk assessment. Obviously when the window of opportunity is very small, it become more complex for an attacker to exploit a vulnerability. For vulnerabilities exposed on low range(not connected to internet) wireless interfaces such as WIFI and BT the window of opportunity is usually considered by evaluating the physical range of the wireless interface. This talk will expose by reusing automotive and IT real life attacks, how low range wireless vulnerabilities can be wormed (replicated) within a fleet to expand exponentially the window of opportunity. Using compromised cars to attack other cars to achieve exponential scaling.