YoVDO

WiFi Exploitation - How Passive Interception Leads to Active Exploitation

Offered By: Cooper via YouTube

Tags

Hack.lu Courses Data Analysis Courses Data Visualization Courses Cybersecurity Courses Ethical Hacking Courses Sensor Networks Courses Man in The Middle Attacks Courses

Course Description

Overview

Explore WiFi exploitation techniques and passive interception methods in this 53-minute conference talk by Solomon Sonya at Hack.lu 2016. Discover how attackers can create user profiles, determine locations, and exploit devices through WiFi vulnerabilities. Learn about engineering distributed sensor networks to capture and interpret 802.11x frames, resolving GPS locations, and visualizing data on Google Maps. Gain insights into carrying out Man-in-the-Middle attacks based on device requests and understand the enhancements needed to secure devices from exploitation. Experience the demonstration of a new framework, Theia Sensor Suite, which automates data analysis and visualization for 802.11 exploitation. Delve into topics such as the anatomy of cyber attacks, frame subtypes, and vulnerability exposure to better comprehend the risks associated with leaving WiFi enabled on smart devices.

Syllabus

Introduction
Security at present
Security during its inception
Anatomy of a cyber attack
How people exploit people
Permissions
Research
Initial knowledge
Unstable marriage
Frame subtypes
Building the sensor
Pea Sensor Suite
Geo Retrieval
Interface
Agent
Vulnerability exposure


Taught by

Cooper

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network