У нас вы можете посмотреть бесплатно #HITBGSec или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
In this brief talk we are going to see a case study where, during a physical red teaming engagment, new techniques have been used to attack corporate WiFi network. Such techniques can help us into letting the victims in falling for our evil twin attack more easily, this is done by abusing the OS trust in CA and SSL certificate, similar to the more common phishing attacks. We will see why corporate WiFi networks are often at risks and how system administrators could better protect against such attacks and tricks. Finally a new tool will be presented to automatically deploy an Evil-Twin attack with this new social engineering technique which is now in your Red Teaming armory. === Matteo is a security researcher enrolled in computer engineering course at Politecnico of Torino. As Opposing Force’s Chief Technical Officer, he manages internal security research on network protocols, Near Field Communication (NFC) and access control security. He presented the results of his research to prestigious international conferences such DEF CON 21, 30th Chaos Communication Congress (30C3), Black Hat USA Arsenal 2014, DEF CON 22 SkyTalks, Black Hat Europe 2014, TetCon 2015, DEFC ON 23 and ZeroNights 2015.