Главная
Study mode:
on
1
Intro
2
Who is Brad
3
Agenda
4
What is 802
5
Playing around with 802
6
EEP
7
Decapsulation
8
Radius
9
Attack Surfaces
10
Known Attacks
11
Free Radius WPE
12
Hostapd
13
No Exploits
14
Peach Fuzzer
15
How it works
16
RFCs
17
Other publishers
18
Free stuff
19
Tools
20
Profile
21
Enumeration
22
WP supplicant
23
Notes for researchers
24
Redirect program flow
25
Exploit
Description:
Explore the intricacies of IEEE 802.1x authentication and its vulnerabilities in this 32-minute Black Hat conference talk. Delve into the dissection of IEEE 802.1x and related protocols like RADIUS and EAP. Discover testing tools and learn about vulnerabilities in popular supporting systems. Witness a demonstration of a RADIUS server vulnerability allowing remote code execution over 802.11 wireless using WPA Enterprise before user authorization. Gain insights into attack surfaces, known attacks, fuzzing techniques, and tools for profile enumeration. Understand the importance of this topic for network security researchers and practitioners.

802.1x and Beyond

Black Hat
Add to list
0:00 / 0:00