Hi, I'm Pieter. I am a cyber security consultant and researcher who is interested in wireless security, network security, privacy, machine learning, and cryptography. One of my main goals is to connect these worlds in order to discover new security issues and ways to mitigate them. Besides my work and research, I enjoy playing the guitar, producing electronic music, and spending time on my hobby projects.
5GSniffer is a free and open-source 5G Physical Downlink Control Channel (PDCCH) blind decoder developed in collaboration with Northeastern University. The tool decodes the PDCCH of a specific 5G base station (gNB), which contains the Downlink Control Information (DCI). This reveals the Radio Network Temporary Identifiers (RNTIs) that are present in the cell, as well as other information enabling traffic analysis.
LoRa is a novel modulation scheme for low power, long range, and low bandwidth machine-to-machine communications that has recently gained popularity in the wireless community. The goal of the gr-lora project is to provide GNU Radio blocks that can decode these LoRa messages on the physical layer using Software Defined Radios (SDRs).
PEAPwn is a proof-of-concept implementation of the PEAP / LEAP relay attack introduced in my paper. It uses a modified version of wpa_supplicant
to establish a PEAP or EAP-TTLS session with the target Authentication Server, and a Python script to exploit several vulnerabilities in iOS < 8 and the MSCHAPv2 protocol.
Proof-of-concept of a remote frame injection vulnerability that was introduced in the 802.11n Wi-Fi standard and discussed in my paper. It is demonstrated how the A-MPDU aggregation mechanism can be exploited to perform a Packet-in-Packet (PIP) attack.
Guiding students during their master's thesis and co-teaching the following courses at Hasselt University as visiting professor:
Performed an audit of the security of uhasselt.be for all publicly accessible pages and pages accessible by students. Topics covered include the discovery of hidden content, security of client side controls (SQLi, XSS, LDAP injection, ...), password and authentication security, random number generator entropy analysis, multi-stage form security, session management, access controls, and basic server application security.
A report can be found here (pdf).
Ph. D. degree, Doctor of Science, with congratulations of the jury
Ph. D. thesis: Explicit and Implicit Information Leakage in Wireless Communication
Master's degree, Computer Science: Multimedia, Magna Cum Laude
Master's thesis: Wireless Network Privacy
Bachelor's degree, Information and Communications Technology (ICT), Cum Laude
Bachelor's thesis: Latency Hiding in Networked Virtual Environments (Dutch)
Excellent knowledge of
Very good knowledge of
Average knowledge of
Basic knowledge of