Главная
Study mode:
on
1
Introduction
2
What is this attack
3
The Karma attack
4
Countermeasures
5
WiFi Sense
6
Finding the right networks
7
Collecting the right data
8
Sending the frames
9
Automatic Wireless Association Algorithm
10
Denial of Service Attack
11
Location Service Spoof
12
Fake Networks
13
Location Service
14
Microsoft Response
15
Am I affected
16
How to protect yourself
17
WiFi Visser
18
Conclusion
Description:
Explore a new technique called "Lure10" for exploiting Windows automatic wireless association in this 32-minute conference talk from HITB2017AMS. Learn how this attack enables attackers to achieve a man-in-the-middle position against Windows devices without user interaction. Discover the limitations of the traditional KARMA attack and how Lure10 overcomes modern network manager countermeasures. Understand the details of the attack, its implementation in the Wifiphisher tool, and compare automatic association behaviors across operating systems. Gain insights into man-in-the-middle case studies and countermeasures. Examine topics such as WiFi Sense, network data collection, frame sending, denial of service attacks, location service spoofing, and Microsoft's response to this vulnerability. Find out if you're affected and how to protect yourself against this exploit.

Exploiting Windows Automatic Wireless Association

Hack In The Box Security Conference
Add to list