DEF CON 24 - Grant Bugher - Bypassing Captive Portals and Limited Networks

  Переглядів 26,000

DEFCONConference

DEFCONConference

7 років тому

Common hotspot software like Chilispot and Sputnik allow anyone to set up a restricted WiFi router or Ethernet network with a captive portal, asking for money, advertising, or personal information in exchange for access to the Internet. In this talk I take a look at how these and similar restrictive networks work, how they identify and restrict users, and how with a little preparation we can reach the Internet regardless of what barriers they throw up.
Bio:
Grant Bugher has been hacking and coding since the early 90’s and working professionally in information security for the last 12 years. He is currently a security engineer for a cloud service provider, and has previously been an architect, program manager and software engineer on a variety of online services, developer tools and platforms. Grant is a prior speaker at BlackHat and DEF CON and a regular DEF CON attendee since DEF CON 16. Most of his research and work is on cloud computing and storage platforms, application security, and detecting & investigating attacks against web-scale applications.

КОМЕНТАРІ: 7
@qsam14
@qsam14 3 роки тому
Can I get a clarification on this? So do you setup the proxy server on the EC2, and use the EC2 web-address on the Linux Machine, and then setup iodine on the linux machine, and then gain access?
@reflectionsofme
@reflectionsofme 5 років тому
you can use a program called tmac for changing windows mac address btw
@soorajnair
@soorajnair 7 років тому
good demo that
@agausmann
@agausmann 7 років тому
"linux has ssh built-in" me: * uses arch linux *
@robinhood2933
@robinhood2933 5 років тому
yh thts bulssshhhit
@maxline4374
@maxline4374 5 років тому
Need help in the procedure of app enginge google
@gibraanjafar1669
@gibraanjafar1669 5 років тому
" If port is open on gateway that doesn't necessarily mean it will work . " Why is that ?
DEF CON 24 - Weston Hecker - Hacking Hotel Keys and Point of Sale Systems
44:20
Transport Layer Security (TLS) - Computerphile
15:33
Computerphile
Переглядів 464 тис.
Cracking WiFi WPA2 Handshake
13:29
David Bombal
Переглядів 1,9 млн
How Hackers Move Through Networks (with Ligolo)
20:01
John Hammond
Переглядів 248 тис.
DEF CON 24 - int0x80 - Anti Forensics AF
37:24
DEFCONConference
Переглядів 48 тис.
Tech Talk: What is Public Key Infrastructure (PKI)?
9:22
IBM Technology
Переглядів 97 тис.
Fiber kablo
0:15
Elektrik-Elektronik
Переглядів 1,4 млн
Apple Event - May 7
38:22
Apple
Переглядів 6 млн
Samsung UE40D5520RU перезагружается, замена nand памяти
0:46
Слава 100пудово!
Переглядів 3,7 млн
Samsung UE40D5520RU перезагружается, замена nand памяти
0:46
Слава 100пудово!
Переглядів 3,7 млн