The recent key reinstallation attacks (KRACK) against the WPA2 protocol revealed how an adversary can easily eavesdrop, and in some cases
tamper, a Wi-Fi connection secured by the WPA2 protocol. At the same
time, Wi-Fi automatic association attacks achieve a similar result
(man-in-the-middle position) not by attacking the WPA2 protocol directly
but by enforcing Wi-Fi clients to join a rogue Access Point.
CENSUS participated at the first BSides Athens event, with a presentation from our researcher George Chatzisofroniou entitled "Getting the most out of Evil Twin with wifiphisher". In his presentation, George showed practical examples of how the popular wifiphisher tool can be used to conduct
successful wifi phishing attacks during penetration tests. As the tool's lead developer, George also provided pointers on features that are planned to be incorporated to the tool in its next release.