Hopping into Enterprise Networks from Thin Air with BLEEDINGBIT


Posted on in Presentations

Zero-day vulnerabilities were found in the majority of access points from top enterprise vendors within low-level embedded chips. Join the Armis researchers who discovered BLEEDINGBIT for a demo of a wireless AP takeover, including exploitation, gaining full remote control, traffic sniffing, malware distribution and lateral movement across network segments.

Learning Objectives:
1: Learn the new exposure created by peripheral radio chips, and see a demo of its malicious potential.
2: Understand airborne attacks and how attackers can leverage them to bypass existing security controls.
3: Learn how low-level embedded chip vulnerabilities affect devices on a complex protocol.

Pre-Requisites:
Technical understanding of wireless networks, access points and bluetooth protocols. Attendees should have five to 10 years of experience with penetration testing and vulnerability analysis to understand concepts presented in this session.

Participants
Nadir Izrael

Participant

Co-Founder & CTO, Armis

Misha Seltzer

Participant

Chief Solutions Architect, Armis Security


Share With Your Community