Explore the critical security flaws in the Web Proxy Auto Discovery (WPAD) protocol in this 25-minute Black Hat conference talk. Delve into the results of extensive experiments conducted by Maxim Goncharov, revealing the surprising prevalence and exploitability of WPAD vulnerabilities in modern networks. Learn about the protocol's inherent risks, its broad applicability for malicious use, and the shocking statistics from real-world tests in various environments, including intranets, open-access networks, and DNS attacks. Discover why WPAD remains a major security concern despite being around for two decades, and gain insights into protecting against this often-overlooked threat. Examine detailed findings from experiments conducted in airport lounges, conferences, hotels, and even aircraft, highlighting the widespread nature of this security issue.
Overview
Syllabus
Intro
Welcome
DHCP
DNS
Request
Experiments
Statistics
Main Name
Domain Names
Company Runs
Main Names
Honeypot
User Agents
New TLDs
Tokyo
Traffic
Government of Tokyo
Hardware
Taught by
Black Hat