Главная
Study mode:
on
1
Intro
2
How secure is the Wi-Fi handshake?
3
Background: the Wi-Fi handshake
4
Wi-Fi handshake simplified
5
Frame Layouts
6
How to test implementations?
7
Modelbased testing our approach
8
Test generation rules
9
Missing downgrade checks
10
Windows 7 targeted Dos
11
Broadcom downgrade
12
OpenBSD: client man-in-the-middle
Description:
Explore the detection and exploitation of logical flaws in Wi-Fi cryptographic handshake implementations in this 44-minute Black Hat conference talk by Mathy Vanhoef. Delve into the security aspects of the Wi-Fi handshake, learn about model-based testing approaches, and examine specific vulnerabilities such as missing downgrade checks and targeted denial-of-service attacks. Gain insights into frame layouts, test generation rules, and real-world examples involving Windows 7, Broadcom, and OpenBSD. Understand the importance of identifying logical vulnerabilities beyond common programming errors in Wi-Fi security.

WiFuzz - Detecting and Exploiting Logical Flaws in the Wi-Fi Cryptographic Handshake

Black Hat
Add to list
0:00 / 0:00