Главная
Study mode:
on
1
Introduction
2
Agenda
3
What we are doing
4
We see something going wrong
5
This is how it all started
6
What are the goals
7
A global picture
8
Three generations of Cisco WLAN
9
Main attack
10
Cryptographic material
11
Complex components
12
WLAN control domains
13
Access points
14
Protocol
15
Authentication
16
Domain Service Masters
17
Master Selection
18
WLCCP Attack
19
Demo
20
Authentication and Leap
21
PRF function
22
Weak authentication
23
Weak authentication demo
24
Disconnect WDS master
25
WDS spoofing
26
Standalone mode
27
Word list attack
28
Generate nhk
29
Back doors
30
Cisco Unified Wireless Network
31
Protocols
32
IP checksum
33
Certificate
34
SNMP
35
SNMP and MIPS
36
SNMP walk
37
SNMP community name
38
WLAN user names
39
Create a new admin user
40
Summary
Description:
Explore a comprehensive security assessment of Cisco Enterprise WLAN components in this conference talk from TROOPERS10. Delve into the vulnerabilities and potential attack vectors within Cisco's wireless network infrastructure, covering three generations of Cisco WLAN technology. Examine cryptographic material, complex components, and WLAN control domains. Investigate access points, protocols, and authentication methods, including the Domain Service Masters and WLCCP attacks. Learn about weak authentication vulnerabilities through live demonstrations and explore various attack techniques such as word list attacks and backdoors. Analyze the Cisco Unified Wireless Network, its protocols, and potential security flaws in IP checksums, certificates, and SNMP. Gain insights into practical exploits, including creating new admin users through SNMP vulnerabilities.

A Security Assessment of Cisco Enterprise WLAN Component

WEareTROOPERS
Add to list
0:00 / 0:00