Главная
Study mode:
on
1
Intro
2
Outline
3
Eduardo Novella
4
Carlo Meijer and Roel Verdult
5
Timeline
6
Wireless Authentication & Deauthentication
7
Obtaining the firmware
8
Dumping the EEPROM
9
Comtrend: Findings
10
Comtrend: Backdoors and super-admin
11
Comtrend: Command Injection in telnet service
12
Comtrend: How to obtain WPA keys?
13
Comtrend: Biggest ISP in Spain, 2010
14
Sitecom: Previous Findings
15
Sitecom: WLR-2X00
16
Sitecom: WPA generation
17
Thomsom in The Netherlands
18
Arcadyan. WPA key generation
19
ADB / Pirelli
20
Conclusion
21
Questions and answers
22
OS Command injection
Description:
Scrutinize WPA2 password generating algorithms in wireless routers through this BSidesLV 2015 conference talk. Delve into the research conducted by Eduardo Novella, exploring vulnerabilities in various router brands including Comtrend, Sitecom, Thomson, Arcadyan, and ADB/Pirelli. Learn about techniques for obtaining firmware, dumping EEPROM, and exploiting backdoors. Discover how to obtain WPA keys and understand the implications of weak password generation algorithms. Examine specific case studies, including findings from Spain's largest ISP in 2010. Gain insights into wireless authentication, deauthentication processes, and potential OS command injection vulnerabilities. Conclude with a Q&A session to further explore the presented security issues in popular wireless routers.

Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers

Add to list
0:00 / 0:00