Invisible Battle 
— Wireless Offence & Defence 

by Chai Kunzhe & Yang Yunfei, Qihoo 360

In this presentation, we will show you how to implement the protection system of enterprise wireless networks using a wireless honeypot, and how to find wireless vulnerabilities through fuzzing. 
 
In defending enterprise wireless networks, Wireless Intrusion Prevention System (WIPS) is widely deployed to detect and defend Cracking Attacks, Denial-of-Service (DoS) Attacks, Rogues Devices, etc. However, hackers can still break the wireless network and gain access to the Intranet in some cases, and the WIPS may not identify the attackers. 
 
Hackers usually choose vulnerable wireless networks as the first attack vector. So if we set up a vulnerable wireless honeypot, it can attract the attention of attackers. We will show you why wireless honeypot is a good complementary measure to WIPS. 
 
Then we will explain how to design and implement a WiFi Fuzzer. We will focus on finding the vulnerabilities in implementations of wireless protocols in wireless adapter drivers. Many implementations in the application layer may also have vulnerabilities such as buffer overflow. We will introduce the principle and structure of a WiFi Fuzzer. 

Infosec in the City. Copyright © 2017-2019
IIC Productions (Pte. Ltd.). All rights reserved.

  • @infoseccity
  • @infosec_city

Contact Us  |  Join Our Mailing List   |  Follow Us :