Overview
Explore advanced attack techniques on 802.11b wireless networks in this Black Hat USA 2002 conference talk presented by Robert Baird and Mike Lynn. Delve into the vulnerabilities of wireless security protocols, including the lack of Wired Equivalent Privacy. Gain insights into wireless best practices and understand the OSI model's relevance to wireless attacks. Examine management frames, authentication processes, and various tools used in wireless penetration testing. Learn about different attack modes, packet generation, and real-world demonstrations. Discuss the implications of radio interference and explore countermeasures to enhance wireless network security. This comprehensive presentation covers both theoretical concepts and practical applications, providing valuable knowledge for security professionals and network administrators.
Syllabus
Intro
No Wired Equivalent Privacy
Tools
Overview
Wireless Best Practices
Background
VPN
OSI Model
Protocol Layers
Management Frames
Toolbox
User Utilities
Nervous
Modes
PF Packet
Code Snippet
Authentication Frames
Generating Traffic
Demonstration
Question
Real Access Point
Cisco Client Utility
Mac
Radio Interference
WaveSec
Taught by
Black Hat