The Black Art of Wireless Post-Exploitation - Bypassing Port-Based Access Controls Using Indirect Wireless Pivots
44CON Information Security Conference via YouTube
AI Adoption - Drive Business Value and Organizational Impact
Our career paths help you become job ready faster
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore advanced wireless network security techniques in this 39-minute conference talk from 44CON 2017. Delve into the vulnerabilities of WPA2-EAP systems and learn how attackers can bypass port-based access controls using indirect wireless pivots. Examine the limitations of relying on EAP-TTLS and EAP-PEAP for enterprise wireless security, and understand why EAP-TLS, despite its implementation challenges, remains the more secure alternative. Discover a novel rogue access point attack that exploits the physical layer of wireless networks, challenging conventional assumptions about reactive security approaches. Gain insights into strengthening wireless infrastructure against sophisticated post-exploitation techniques and the importance of robust physical layer protections in enterprise environments.
Syllabus
The Black Art of Wireless Post-Exploitation - Gabriel Ryan at 44CON 2017
Taught by
44CON Information Security Conference