Wireless Offense and Defense, Explained and Demonstrated!


Posted on in Presentations

This session will discuss the use of radio frequency, often overlooked for network enumeration and attack. The techniques to be discuss are used to identify authorized and unauthorized signals in an organization. Without understanding the offensive attacks an organization can’t perform effective defense. The talk will explain and demonstrate how to enumerate and gain access to resources through RF signals.

Learning Objectives:
1: Understand that wireless doesn’t just mean WiFi.
2: Understand that the Bluetooth protocol can allow for direct attacks against phones, PCs and other devices.
3: Learn that other RF attacks are very difficult to detect, and gain an understanding of what they look like.

Pre-Requisites:
The biggest prerequisite for our talk is an open mind and the ability to understand risk, and after the talk to better assess risk on your environment.

Participants
Rick Farina

Participant

Senior Product Manager, WLAN Software Security, Aruba

Rick Mellendick

Participant

Chief Security Officer, Process Improvement Achievers LLC

Mobile & IoT Security

threat management threat intelligence security services risk management risk & vulnerability assessment physical security penetration testing network security mobile security hackers & threats exploit of vulnerability endpoint security cyberterrorism cyber warfare & cyber weapons critical infrastructure BYOD


Topic

Subtopic


Share With Your Community