DEF CON Forum Site Header Art
DEF CON Forum Site Header Art

Announcement

Collapse
No announcement yet.

Advanced Wireless Attacks Against Enterprise Networks by solstice at DEF CON 29

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Advanced Wireless Attacks Against Enterprise Networks by solstice at DEF CON 29

    Advanced Wireless Attacks Against Enterprise Networks
    Solstice

    Materials or Equipment students will need to bring to participate?:

    Students will be required to provide their own laptops, which must meet the following requirements:
    • must be capable of running virtualization software such as VMWare or VirtualBox
    • must have at least 100gb of free disk space OR have a free USB port and supplementary external hard drive with at least 100gb of free disk space available
    • must be provisioned with a 64-bit operating system

    What level of skill is required for your targeted audience?:

    Ideally students should be intermediates who want to take a deeper dive into wireless security. With that said, I've had plenty of beginners and advanced students in the class who seemed to enjoy themselves.

    Abstract:
    This workshop will instruct attendees on how to carry out sophisticated wireless attacks against corporate infrastructure. Attendees will learn how to attack and gain access to WPA2-Enterprise networks using relay attacks, how to abuse MSCHAPv2 and GTC to efficiently capture network credentials, perform effective target selection with zero prior knowledge, leverage rogue access point attacks to deliver malware and harvest keystrokes, and abuse Opportunistic Wireless Encryption (OWE) to perform PITM attacks. All material discussed in the lectures will be practiced within a realistic lab environment.

    Trainer Bio:
    Solstice is an offensive security engineer at a major cloud provider. He currently specializes in kinetic threats, identifying attack vectors against "edge" devices deployed in hostile environments. Previously, he worked as a red team operator at companies such as SpecterOps, specializing in SIGINT and Windows-focused adversarial tradecraft. He is the author of EAPHammer, SilentBridge, DropEngine, and has contributed to high-profile projects such as hostapd-wpe and Empire.
    PGP Key: https://defcon.org/html/links/dtangent.html
Working...
X