Главная
Study mode:
on
1
Intro
2
Shameless Self Promotion
3
SecurityTube.net Training
4
Pentester Academy
5
WPA-Personal - Passphrase Base
6
WPA-PSK Dictionary Attack
7
Open Source Tools Available!
8
PBKDF2
9
PMK Generator Architecture
10
Worker Architecture
11
Relational Database in the Cloud
12
Workflow
13
Handshake Verification
14
Benchmark
15
Costs Involved - PMK Creation
16
Costs Involved – PMK Verification
17
Google App Engine
18
Chigu - Amazon EC2
19
Chigu in Action
20
WPA-Enterprise
21
Chigu Public Release
Description:
Explore advanced techniques for cracking WPA/WPA2 Personal and Enterprise using cloud computing resources in this 37-minute conference talk from nullcon Goa 2014. Delve into the power of dictionary-based attacks leveraging massive cloud compute power to iterate through billions of combinations in practical timeframes. Learn about open-source tools, PBKDF2, PMK generator architecture, and worker architecture for distributed cracking. Examine the workflow, handshake verification, benchmarks, and costs involved in PMK creation and verification. Discover how to utilize Google App Engine and Amazon EC2 for WPA/WPA2 cracking, with a focus on the Chigu tool. Gain insights into the future of wireless security testing as cloud resources make previously impractical attacks feasible.

Attacking WPA-WPA2 in the Cloud

nullcon
Add to list