Candlelites

Everything from Everywhere

wireless exploit tactics and solutions revealed at sector

wireless exploit tactics and solutions revealed at sector News Article With The full text news. The Resource Link is down the post and you can View this News Article in the source page.



wireless exploit tactics and solutions revealed at sector

toronto—there are a lot of ways to hack a a security researcher explains how wpa2 enterprise wireless security can be bypassed and why the eap-tls wireless authentication protocol should be more widely deployed to help mitigate risks. wifi network, and gabriel ryan, security engineer at security firm gotham digital science, detailed many of them in a session at the sector conference here on nov. 14.during his session, titled "the black art of wireless post-exploitation," ryan demonstrated the new eaphammer tool that he created to hack wpa2-enterprise networks. he also detailed new attack methods to bypass misconfigured wpa2 wifi networks, including a wireless pivot attack. while there is no shortage of attack methods, ryan also strongly advocated for the use of the eap-tls (extensible authentication protocol transport layer security) protocol to help stop multiple forms of wifi attack.ryan explained that while wpa2 wifi protection encrypts data sent wirelessly, an area of weakness where potential attacks can be performed is during the initial "handshake" connection, when the wireless user starts a connection.the eaphammer toolkit that ryan developed and demonstrated during his sector session can help security researchers perform what is known as an "evil twin" attack against wpa2-enterprise networks. in an evil twin attack, a rogue access point is set up to mimic the address and connectivity of an authentic wifi access point.related reading"it [eaphammer] is designed...