Главная
Study mode:
on
1
Introduction
2
History of WiFi Security
3
Aggregation
4
Attack Scenario
5
Demonstration
6
How it works
7
How fragmentation works
8
Fragmentation design flaw
9
Aggregation design flaw
10
Implementation flaws
11
CloakedAMSD
12
Other flaws
Description:
Explore three novel security-related design flaws in Wi-Fi and various widespread implementation flaws in this 37-minute Black Hat conference talk. Learn how adversaries can exploit these vulnerabilities to inject packets or exfiltrate selected frames, with a demonstration on using packet injection to bypass router NAT and connect to internal devices. Delve into the history of Wi-Fi security, aggregation techniques, and attack scenarios. Understand the intricacies of how fragmentation works, its design flaws, and aggregation design flaws. Examine implementation flaws, cloaked AMSDO, and other vulnerabilities in Wi-Fi systems. Gain valuable insights from security researcher Mathy Vanhoef on protecting Wi-Fi networks from these "FragAttacks."

FragAttacks - Breaking Wi-Fi through Fragmentation and Aggregation

Black Hat
Add to list
0:00 / 0:00