Articles with tag: Wifi
POSTED BY: sophron / 01.02.2018

The Known Beacons Attack (34th Chaos Communication Congress)

The recent key reinstallation attacks (KRACK) against the WPA2 protocol revealed how an adversary can easily eavesdrop, and in some cases tamper, a Wi-Fi connection secured by the WPA2 protocol. At the same time, Wi-Fi automatic association attacks achieve a similar result (man-in-the-middle position) not by attacking the WPA2 protocol directly but by enforcing Wi-Fi clients to join a rogue Access Point.


POSTED BY: sophron / 11.05.2017

Lure10: Exploiting Windows Automatic Association Algorithm

Lure10 is a novel technique presented at the Hack-in-the-Box 2017 conference in Amsterdam that enables an attacker to automatically achieve a man-in-the-middle position against wireless devices running the Windows operating system. The attack requires no user interaction and exploits the "Wi-Fi Sense" feature found in recent versions of the Microsoft Windows platform.


POSTED BY: census / 26.04.2017

Hack In The Box 2017 Amsterdam

CENSUS researcher George Chatzisofroniou presented a novel WiFi attack technique named 'Lure10' at the CommSec track of the Hack In the Box 2017 conference in Amsterdam. The technique allows the automatic association of a Windows device to an attacker-controlled WiFi access point. The attacker may then mount a series of Man-in-the-Middle attacks to the victim device.


POSTED BY: census / 14.07.2016

BSides Athens 2016

CENSUS participated at the first BSides Athens event, with a presentation from our researcher George Chatzisofroniou entitled "Getting the most out of Evil Twin with wifiphisher". In his presentation, George showed practical examples of how the popular wifiphisher tool can be used to conduct successful wifi phishing attacks during penetration tests. As the tool's lead developer, George also provided pointers on features that are planned to be incorporated to the tool in its next release.