DEF CON 21 - Djwishbone and PuNk1nPo0p - BYO Disaster

BYO-Disaster and Why Corporate Wireless Security Still Sucks
JAMES SNODGRASS (PUNK1NPO0P) HILLBILLY HACKER
JOSH HOOVER (WISHBONE) HILLBILLY HACKER

Right when you thought this topic had been beaten to death, something new emerges. This horse isn't dead yet! This talk will focus on a completely new vulnerability in the way some devices handle MsChapV2 and present some newer methods for capturing clear text credentials easily and without heavy processing power. We will walk you through a full attack against WPA2 enterprise networks using a special patched version of radius that makes this all possible. But wait, there's more! Act now, by coming to the talk, and you'll receive access to new automation tools to do a lot of the work for you. If you're lazy like us and would like access to credentials without a math degree this talk is for you!

James Snodgrass enjoys pumping iron and flattening hats. His greatest aspiration in life is leveling his Ford truck and finding that next tight t-shirt.

Josh Hoover (@wishbone1138) has spent over a decade in computer security, focused on digital forensics and penetration testing. He has been attending DEF CON for 14 years but this is the first time he has ever spoken at one.



Materials:
https://www.defcon.org/images/defcon-21/dc-21-presentations/djwishbone-PuNk1nPo0p/DEFCON-21-djwishbone-PuNk1nPo0p-BYO-Disaster-Updated.pdf
https://www.defcon.org/images/defcon-21/dc-21-presentations/djwishbone-PuNk1nPo0p/DEFCON-21-djwishbone-PuNk1nPo0p-BYO-Disaster-Tool-Updated.txt
Slide lưu trữ tại đây



Comments

Popular posts from this blog

Thiết lập card không dây trên Kali Linux

Monitor mode

Giới thiệu - Scapy