The Black Art of Wireless Post-Exploitation - Bypassing Port-Based Access Controls Using Indirect Wireless Pivots
44CON Information Security Conference via YouTube
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced wireless network security techniques in this 39-minute conference talk from 44CON 2017. Delve into the vulnerabilities of WPA2-EAP systems and learn how attackers can bypass port-based access controls using indirect wireless pivots. Examine the limitations of relying on EAP-TTLS and EAP-PEAP for enterprise wireless security, and understand why EAP-TLS, despite its implementation challenges, remains the more secure alternative. Discover a novel rogue access point attack that exploits the physical layer of wireless networks, challenging conventional assumptions about reactive security approaches. Gain insights into strengthening wireless infrastructure against sophisticated post-exploitation techniques and the importance of robust physical layer protections in enterprise environments.
Syllabus
The Black Art of Wireless Post-Exploitation - Gabriel Ryan at 44CON 2017
Taught by
44CON Information Security Conference