Loading...

DEF CON 23 - Wireless Village - V. Ramachandran - Automatic Live WPA WPA2 Attacks and WPA Supplicant

6,518 views

Loading...

Loading...

Transcript

The interactive transcript could not be loaded.

Loading...

Loading...

Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on Dec 4, 2015

In this workshop you will learn how to automate Wpa_supplicant to conduct live attacks on WPA/WPA2 PSK and Enterprise networks. We will be using Wpa_supplicant's control interface for automation via Python. We will be touching upon both the wpactrl wrapper as well as the DBUS API to demonstrate custom scripts for attacks.

Speaker Bio:
Vivek Ramachandran discovered the Caffe Latte attack, broke WEP Cloaking and publicly demonstrated enterprise Wi-Fi backdoors. He is the author of "Backtrack 5: Wireless Penetration Testing" which has sold over 13,000+ copies worldwide. He is the founder of SecurityTube.net and runs SecurityTube Training & Pentester Academy which has trained professionals from 90 countries. He has spoken/trained at DEF CON, Blackhat USA/Europe/Abu Dhabi, Brucon, Hacktivity etc. conferences.

Loading...


to add this to Watch Later

Add to

Loading playlists...