DEFCON-18-Ahmad-WPA-Too.pdf
(
1004 KB
)
Pobierz
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
WPA
TOO !
Md Sohail Ahmad
AirTight Networks
www.airtightnetworks.com
About the Speaker
2008, Defcon 16
2007, Toorcon9
Autoimmunity
Disorder in
Wireless LANs
Caffe Latte Attack
2010, Defcon 18
2009, Defcon 17
WPA TOO !
WiFish Finder: Who
will bite the bait?
About the Talk
WPA2 is vulnerable under certain conditions. This
limitation, though known to the designers of WPA2, is not
well understood or appreciated by WiFi users.
In this talk, I am going to show that
exploits are possible
using off the shelf tools with minor modifications.
Defcon 18
Background
WEP, the one and only security configuration present in the original 802.11
standard, was cracked in 2001. Since then several attacks on WEP have been
published and demonstrated
Nowadays most WLANs are secured with a much better and robust security
protocol called WPA2
.
Interestingly, WPA2 is also being used to
secure Guest WiFi, Municipal WiFi
(e.g.
GoogleWiFi Secure)
and Public WiFi
(e.g. T-
Mobile or AT&T WiFi Hotspot)
networks.
Is WPA2 safe to be used in WiFi networks?
Defcon 18
Plik z chomika:
deratoul
Inne pliki z tego folderu:
1. addison wesley - advanced programming languages design.pdf
(1252 KB)
2. compiler construction manual.pdf
(2198 KB)
3. compilers and compiler generators in C++.pdf
(1204 KB)
4. morgan kaufmann - engineering a compiler (Draft).pdf
(2656 KB)
5. Algorithms For Compiler Design.pdf
(12977 KB)
Inne foldery tego chomika:
Security and Hacking Books 01
Security and Hacking Books 02
Security and Hacking Books 03
Zgłoś jeśli
naruszono regulamin