Description: https://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-murilo-edwardo.pdf Although it's not something new at all, network administrators are still facing (and having to deal) with old problems and threats. One of these problems is to be able to detect rogue and/or fake access points in their networks and surroundings. The current solutions available are mostly commercial and/or proprietary, but we haven't seen yet any open-source tool that implements specifically WIDS capabilities. We would like to introduce to DefCon: Beholder. The talk will include a brief introduction on the general state of the commercial WIDS tools and evolution of wireless attacks, and will be mostly focused on the Beholder project. Beholder is an C language opensource tool available (for now) for linux platforms, and it can be used for any available 802.11 technology a nic card may support, and it isn't driver dependent, run in all available linux wifi drivers. The tool does some, of course, some basic network scanning, but also implements some simple (but cool) stuff, that some of the commercial tools don't have. The presentation will cover details about that tool, future features, scenarios to be implemented, examples, and a demo (yep, demo at DefCon) of malicious AP/tools in action and how beholder can be used to detect it
Tags: securitytube , defcon , def con , hacking , hackers , information security , convention , computer security , DC 16 , Defcon 16 , dc-16 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.