YoVDO

The Black Art of Wireless Post-Exploitation - Bypassing Port-Based Access Controls Using Indirect Wireless Pivots

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Penetration Testing Courses

Course Description

Overview

Explore advanced wireless network security techniques in this 39-minute conference talk from 44CON 2017. Delve into the vulnerabilities of WPA2-EAP systems and learn how attackers can bypass port-based access controls using indirect wireless pivots. Examine the limitations of relying on EAP-TTLS and EAP-PEAP for enterprise wireless security, and understand why EAP-TLS, despite its implementation challenges, remains the more secure alternative. Discover a novel rogue access point attack that exploits the physical layer of wireless networks, challenging conventional assumptions about reactive security approaches. Gain insights into strengthening wireless infrastructure against sophisticated post-exploitation techniques and the importance of robust physical layer protections in enterprise environments.

Syllabus

The Black Art of Wireless Post-Exploitation - Gabriel Ryan at 44CON 2017


Taught by

44CON Information Security Conference

Related Courses

Supply Chain Unchained - How To Be A Bad SaaS
44CON Information Security Conference via YouTube
Aviation Security 101
44CON Information Security Conference via YouTube
The Anti-Checklist Manifesto
44CON Information Security Conference via YouTube
Why Are We Still Doing Authentication Wrong?
44CON Information Security Conference via YouTube
What Do Hackers See When They Look at the Clouds
44CON Information Security Conference via YouTube