The Myth Of WiFi Security - TopicsExpress



          

The Myth Of WiFi Security https://youtube/watch?v=9Y1BbE2eC4I I am AGAINST hacking, but in order to defend oneself appropriately one needs to know how the Criminals operate, so here is a webcast on how they operate and how low their way of thinking is. Information is either Private or subject of investigation, no other stays like “I want to see what they are doing”, or “I want to steal from them some MONEY or INFORMATION” are malicious and CRIMINAL Acts. Disclaimer: If this teaches you something, and you use that knowledge to get you or your friends arrested, then you are an idiot, and it is not my fault. By continuing to watch this video, you are agreeing to these terms. This is from my speech given at Memphis Security B-Sides Conference SEP-15-2012 gkbg.tv/PEk4lz DL This Slideshow from Googls Docs: gkbg.tv/PEeccd How to install Aircrack-ng Suite: gkbg.tv/PEgEPK How I Met Your Girlfriend: gkbg.tv/PEhsEn My Suppliers/Manufacturers: gkbg.tv/PEjtk1 gkbg.tv/PEjJ2w gkbg.tv/PEjUdZ Wigle WiFi Android Wardrive App: gkbg.tv/PEkfh1 Android Wardriving Video: gkbg.tv/PEkBUM Download MDK3 Tool: gkbg.tv/PEkRTR Airdrop-ng DeAuth Tool: gkbg.tv/PEl6OF Speaker: James Kegel Title: The Myth of WiFi Security Abstract: This talk will aim to inform the user about the risks associated with the convenience of operating a wireless network in the 802.11 spectrum. The presentation will briefly cover the different types of attacks, the different types of WiFi encryption schemes, and the associated attack vectors currently being used in the wild to exploit them. The presenter will cover the different tools needed to perform the attacks manually, and give a brief explanation of the commands associated and about what is going on in the background to accomplish the goal of the attack, with examples of how this would take place in a real world scenario. The presenter will brief the audience of what would motivate a potential attacker, and offer them a chance to get inside of the head of a wireless hacker, whether they be whitehat or blackhat. At the conclusion of the presentation the presenter will give a checklist to determine how safe your wireless network is, and a few criteria to decide if one would actually need a wireless network for their network deployment, as well as a few simple steps to take in securing your network. Some of the topics, terms and tools discussed will be: WEP, WPA, Tkip, PSK, Cisco Leap, Rainbow Tables/Time Memory Tradeoff, Brute Force, Arp Replay, Arp Poisoning/Man in the Middle, Rogue Access Points, Packet sniffing with TCPDump and Wireshark, Automated attacks with WiFite, Manual attacks with Aircrack-ng suite, Network Disruption with MDK3, Network Mapping with Nmap. A few prerequisites would be a basic familiarity with the command line, and a basic understanding of 802.11 Wireless technology. More information: Wireless - Security (HD) https://youtube/watch?v=rIzTgaMhovg geekblog.tv/ Defending Against Metasploit Based Attacks. youtube/watch?v=IxgLVk4ozs4 hak5.org/ revision3/hak5/ miroguide/feeds/13061#pg2 youtube/user/Hak5Darren https://hakshop.myshopify/collections/wifi-pineapple-kits/products/wifi-pineapple-mark-v-ultra-bundle
Posted on: Sun, 14 Sep 2014 08:05:37 +0000

Trending Topics



Recently Viewed Topics




© 2015