This is not your ordinary wireless talk, leave your WEP and WPA/2 preshared keys at home. No pineapples here.
This talk looks at the WPA2 Enterprise wireless authentication mechanisms, and the weaknesses within. We’ll go through the pros/cons of Extensible Authentication Protocol types and give a live demonstration of how an attacker can harvest sensitive data from these protocols. Code will be dropped, audience participation is encouraged.
- Enterprise Wireless Security
- Wireless Hacking
About Travis Kaun
Travis Kaun is a seasoned security professional with a focus on offensive security practices and penetration testing. He has spent time working with small and large corporate enterprises as well as managed security service providers before landing into the consulting world. Connect with Kaun on the Shellntel.com blog.