Главная
Study mode:
on
1
Introduction
2
Security at present
3
Security during its inception
4
Anatomy of a cyber attack
5
How people exploit people
6
Permissions
7
Research
8
Initial knowledge
9
Unstable marriage
10
Frame subtypes
11
Building the sensor
12
Pea Sensor Suite
13
Geo Retrieval
14
Interface
15
Agent
16
Vulnerability exposure
Description:
Explore WiFi exploitation techniques and passive interception methods in this 53-minute conference talk by Solomon Sonya at Hack.lu 2016. Discover how attackers can create user profiles, determine locations, and exploit devices through WiFi vulnerabilities. Learn about engineering distributed sensor networks to capture and interpret 802.11x frames, resolving GPS locations, and visualizing data on Google Maps. Gain insights into carrying out Man-in-the-Middle attacks based on device requests and understand the enhancements needed to secure devices from exploitation. Experience the demonstration of a new framework, Theia Sensor Suite, which automates data analysis and visualization for 802.11 exploitation. Delve into topics such as the anatomy of cyber attacks, frame subtypes, and vulnerability exposure to better comprehend the risks associated with leaving WiFi enabled on smart devices.

WiFi Exploitation - How Passive Interception Leads to Active Exploitation

Cooper
Add to list
0:00 / 0:00