Learn how to create Wi-Fi backdoors using BindRev shells in this 51-minute conference talk from BSidesLV 2015. Explore the concepts of hosted networks, personal area networks, and post-exploitation techniques. Understand the security implications, Microsoft's response, and alternative approaches. Discover practical applications including honeypot detection, fake AP detection, and low-level device drivers. Witness a live demonstration and gain insights into detecting events and creating networks. Delve into the intricacies of Airbase and other relevant tools for Wi-Fi security research and penetration testing.
Overview
Syllabus
Introduction
Why BindRev
Hosted Network
Personal Area Networks
Post Exploitation
Why is this worrisome
Microsofts response
Demo
Other options
Why is this interesting
chellam
honeypot detection
fake AP detection
lowlevel device driver
Airbase
Detecting Events
Creating a Network