DEFCON-18-Ahmad-WPA-Too.pdf

(1004 KB) Pobierz
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
WPA TOO !
Md Sohail Ahmad
AirTight Networks
www.airtightnetworks.com
858592562.017.png 858592562.018.png
About the Speaker
2008, Defcon 16
2007, Toorcon9
Autoimmunity
Disorder in
Wireless LANs
Caffe Latte Attack
2010, Defcon 18
2009, Defcon 17
WPA TOO !
WiFish Finder: Who
will bite the bait?
858592562.019.png 858592562.020.png 858592562.001.png 858592562.002.png 858592562.003.png 858592562.004.png 858592562.005.png 858592562.006.png 858592562.007.png 858592562.008.png 858592562.009.png 858592562.010.png 858592562.011.png 858592562.012.png 858592562.013.png
About the Talk
WPA2 is vulnerable under certain conditions. This
limitation, though known to the designers of WPA2, is not
well understood or appreciated by WiFi users.
In this talk, I am going to show that exploits are possible
using off the shelf tools with minor modifications.
Defcon 18
858592562.014.png
Background
WEP, the one and only security configuration present in the original 802.11
standard, was cracked in 2001. Since then several attacks on WEP have been
published and demonstrated
Nowadays most WLANs are secured with a much better and robust security
protocol called WPA2 .
Interestingly, WPA2 is also being used to
secure Guest WiFi, Municipal WiFi (e.g.
GoogleWiFi Secure) and Public WiFi (e.g. T-
Mobile or AT&T WiFi Hotspot) networks.
858592562.015.png
 
Is WPA2 safe to be used in WiFi networks?
Defcon 18
858592562.016.png
Zgłoś jeśli naruszono regulamin