BEGIN:VCALENDAR
PRODID:-//vBulletin 6//EN
VERSION:2.0
CALSCALE:GREGORIAN
BEGIN:VEVENT
UID:6ccb02c0-b4e1-4185-9a80-08ea5f210e80
DTSTAMP:20260502T171417Z
SUMMARY:James Hawk\, Lander Beyer\, Daniel Costantini - Hide your kids\, tu
 rn off your Wi-Fi\, they Rogue...
DESCRIPTION:Title: James Hawk\, Lander Beyer\, Daniel Costantini - Hide you
 r kids\, turn off your Wi-Fi\, they Rogue APing up in here\n\nScheduled Da
 te and Time (Pacific Standard): Thursday\, August 10\, 2023\, at 1400-1800
  PDT\n\nEventBrite Link: https://www.eventbrite.com/e/james-hawk-they-rogu
 e-aping-up-in-here-tickets-668364505227?aff=oddtdtcreator\n\nMax Class Siz
 e: 25\n\n\n\n\nAbstract:\n\nThis workshop will teach you how to deploy Rog
 ue APs in your client's environment. Using Rogue APs lets you test your cl
 ient's Wireless Intrusion Detection System\, passwords\, wireless phishing
  education\, and overall wireless security. We will discuss Rogue AP Tacti
 cs\, Techniques\, and Procedures\, and how and why they work. In this work
 shop we will walk through setting up an OPEN\, CAPTIVE PORTAL\, WPA2\, and
  802.1x Rogue AP. We will also go over OWE and WPA3-SAE transition mode Ro
 gue APs.\n\nThe primary goal is setting up Rogue APs to harvest credential
 s. In the workshop\, we will walk through a scenario at a client’s site\
 , then set up a Rogue AP to harvest users’ credentials for the various n
 etworks at the site. We will go through how to crack the harvested credent
 ials. We will be using EAPHAMMER\, HOSTAPD-MANA\, WIFIPHISHER\, and AIRBAS
 E-NG for the Rogue AP portion\, HASHCAT\, AIRCRACK-NG\, and JOHN for the c
 racking portion. This workshop is for beginners\, but participants should 
 have basic Linux and 802.11 knowledge and be comfortable using virtual mac
 hines.\n\n\n\n\nRecommended reading/viewing:\n\nhttps://posts.specterops.i
 o/modern-wireless-attacks-pt-i-basic-rogue-ap-theory-evil-twin-and-karma-a
 ttacks-35a8571550ee\n\nhttps://sensepost.com/blog/2015/improvements-in-rog
 ue-ap-attacks-mana-1%2F2/\n\nhttps://www.youtube.com/watch?v=i2-jReLBSVk\n
 \n\n\n\nSkill Level: Beginner\n\nPrerequisites for students: None\n\n\n\n\
 nMaterials or Equipment students will need to bring to participate:\n\nLap
 top with 8 GBS RAM\n\nVirtual Box / VMware Installed\n\nWireless card with
  Access Point Mode and monitor mode. Recommended chip set AWUS036ACM.\n\n\
 n\n\nBios:\n\nJames Hawk (He/Him) is a Senior Consultant with Mandiant\, w
 ithin Proactive Services. He is the wireless subject matter expert for his
  team. James has led and contributed to dozens of assessments (Red Teams a
 nd Pen Tests). He has developed internal training and tool updates for 802
 .11 for his company. James is a 20-year veteran of the U.S. Army and has o
 ver 10 years hands-on experience in wireless technologies. James is always
  researching/testing 802.11 attacks against his home lab. He is a fan of h
 ockey\, LetterKenny\, and almost anything sci-fi.\n\n\n\n\nLander Beyer (H
 e/Him) is the Manager of Mandiant’s Proactive Services team within their
  Global Government section. Lander has performed dozens of penetration tes
 ting services against State\, Local\, and Education (SLED) organizations\,
  to include wireless and physical assessments. Lander is a cyber branch wa
 rrant officer in the California Army National Guard\, and a proud husband 
 and father of two. He enjoys table tennis\, long walks in the rain\, and D
 omain Admin.\n\n\n\n\nDaniel Costantini is a Principal Consultant with Man
 diant\, within Proactive Services. He is a Red Team/Penetration Testing su
 bject matter expert in a variety of disciplines. Daniel has led and contri
 buted to over a hundred Penetration/Red Team assessments. Over the years h
 e has gained vast experience in living off the land\, application\, web\, 
 and network penetration testing. He continues\, to strengthen his expertis
 e in advanced wireless assessments. Daniel is a 17-year veteran of the Uni
 ted States Air Force (USAF) with ten of those years on active-duty and con
 tinues to serve in the United States Air Force Reserves. He has performed 
 Penetration tests for USAF while on active duty and as a civilian contract
 or. He enjoys spending time with his family\, playing games\, and relaxing
  in front of the television.\n​
URL:https://forum.defcon.org/node/246026
DTSTART:20230810T220000Z
DTEND:20230811T020001Z
LOCATION:Las Vegas\, NV\, DEF CON 31
END:VEVENT
END:VCALENDAR
