YoVDO

802.1x and Beyond

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Network Security Courses Wireless Security Courses Vulnerability Analysis Courses Remote Code Execution Courses

Course Description

Overview

Explore the intricacies of IEEE 802.1x authentication and its vulnerabilities in this 32-minute Black Hat conference talk. Delve into the dissection of IEEE 802.1x and related protocols like RADIUS and EAP. Discover testing tools and learn about vulnerabilities in popular supporting systems. Witness a demonstration of a RADIUS server vulnerability allowing remote code execution over 802.11 wireless using WPA Enterprise before user authorization. Gain insights into attack surfaces, known attacks, fuzzing techniques, and tools for profile enumeration. Understand the importance of this topic for network security researchers and practitioners.

Syllabus

Intro
Who is Brad
Agenda
What is 802
Playing around with 802
EEP
Decapsulation
Radius
Attack Surfaces
Known Attacks
Free Radius WPE
Hostapd
No Exploits
Peach Fuzzer
How it works
RFCs
Other publishers
Free stuff
Tools
Profile
Enumeration
WP supplicant
Notes for researchers
Redirect program flow
Exploit


Taught by

Black Hat

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity