Whitepaper: The Black Art of Wireless Post-Exploitation - Bypassing Port-Based Access Controls Using Indirect Wireless Pivots

Whitepaper: The Black Art of Wireless Post-Exploitation – Bypassing Port-Based Access Controls Using Indirect Wireless Pivots

/
At DEF CON 25 we introduced a novel attack that can be used to bypass port-based access controls in WPA2-EAP networks. We call this technique an Indirect Wireless Pivot. The attack, which affects networks implemented using EAP-PEAP or EAP-TTLS, takes advantage of the fact that port-based access control mechanisms rely ... Read More
DEF CON 24 Wireless Village - Gabriel Ryan - Slaving Rogue Access Points w/ Python & Cheap Hardw

Whitepaper: Identifying Rogue Access Point Attacks Using Probe Response Patterns and Signal Strength

/
Last summer we released material at DEF CON 2016 documenting our research on rogue access point attack detection. As a follow-up, we are releasing our extended whitepaper on the subject. The whitepaper begins by providing a thorough overview of the weaknesses that make 802.11 susceptible to rogue access point attacks ... Read More
Slaying Rogue Access Points with Python and Cheap Hardware

Slaying Rogue Access Points with Python and Cheap Hardware

The Need for Open Source Rogue AP Protection With the exception of cellular attacks that make use of SDR, rogue access point attacks are the most effective wireless attacks in practice today. Despite the fact that karma attacks have existed for nearly ... Read More