YoVDO

Attacking WPA-WPA2 in the Cloud

Offered By: nullcon via YouTube

Tags

nullcon Courses Cybersecurity Courses Cloud Computing Courses Network Security Courses Ethical Hacking Courses Cloud Databases Courses Dictionary Attacks Courses

Course Description

Overview

Explore advanced techniques for cracking WPA/WPA2 Personal and Enterprise using cloud computing resources in this 37-minute conference talk from nullcon Goa 2014. Delve into the power of dictionary-based attacks leveraging massive cloud compute power to iterate through billions of combinations in practical timeframes. Learn about open-source tools, PBKDF2, PMK generator architecture, and worker architecture for distributed cracking. Examine the workflow, handshake verification, benchmarks, and costs involved in PMK creation and verification. Discover how to utilize Google App Engine and Amazon EC2 for WPA/WPA2 cracking, with a focus on the Chigu tool. Gain insights into the future of wireless security testing as cloud resources make previously impractical attacks feasible.

Syllabus

Intro
Shameless Self Promotion
SecurityTube.net Training
Pentester Academy
WPA-Personal - Passphrase Base
WPA-PSK Dictionary Attack
Open Source Tools Available!
PBKDF2
PMK Generator Architecture
Worker Architecture
Relational Database in the Cloud
Workflow
Handshake Verification
Benchmark
Costs Involved - PMK Creation
Costs Involved – PMK Verification
Google App Engine
Chigu - Amazon EC2
Chigu in Action
WPA-Enterprise
Chigu Public Release


Taught by

nullcon

Related Courses

Unearthing Malicious and Risky OpenSource Packages Using Packj
nullcon via YouTube
Pushing Security Left by Mutating Byte Code
nullcon via YouTube
The Faces of MacOS Malware - Detecting Anomalies in a Poisoned Apple
nullcon via YouTube
Contextomy - Let's Debug Together
nullcon via YouTube
Mind The Gap - The Linux Ecosystem Kernel Patch Gap
nullcon via YouTube