Главная
Study mode:
on
1
Introduction
2
What is an SSID
3
ITripleE Standards
4
History
5
Initial Discovery
6
General Devices
7
Device Order
8
Limitations
9
Device Limitations
10
Register a Short Domain
11
Escape the Backslash
12
Crosssite Scripting
13
Demo
14
Command Injection
15
Parsing Routine
16
Execution
17
Challenge
18
Crosssite request forgery
19
Demonstration
20
Rube
21
Prayer
22
Hells Half Acre
23
Testing
24
Configuration
25
Targets
Description:
Explore practical exploitation techniques using malicious Service Set Identifiers (SSIDs) in this DerbyCon 3.0 conference talk. Delve into the fundamentals of SSIDs, IEEE standards, and their historical context before examining initial discovery methods and device-specific considerations. Learn about overcoming limitations, registering short domains, and escaping backslashes. Witness demonstrations of cross-site scripting and command injection vulnerabilities, and understand parsing routines and execution challenges. Gain insights into cross-site request forgery attacks and explore testing configurations for various targets. Enhance your knowledge of wireless network security and potential attack vectors through this comprehensive presentation.

Practical Exploitation Using A Malicious Service Set Identifier - SSID - Deral Heiland

Add to list