3 weeks ago
35 Views

Wi-Fi Hacking, MITM Attacks & the USB Rubber Ducky « Null Byte :: WonderHowTo

Null Byte users have often requested video content, however the question has always been what format would certainly best serve our community. This kind of week, we partnered with Null Space Labs, a hackerspace in Los Angeles, to test the waters by hosting a series of talks on ethical hacking for students in Pasadena Computer Science Club. We invited students in addition to also Null Byte writers to deliver talks on Wi-Fi hacking, MITM attacks, in addition to also rogue devices like the USB Rubber Ducky.

(1) Pasadena CS Students attend Null Byte in addition to also Null Space Labs’s Ethical Hacking talk. (2) Our “Google Starbucks” network demonstrating how to capture wireless hosts. (3) Kody Kinzie explains the attackers behind Wi-Fi hacking. (4) Ian explaining how to encode IP addresses to hide them coming from firewalls. Images via Null Byte

While our first live stream started out slightly delayed, our group of writers in addition to also students can be excited to bring you the first of our workshops in addition to also presentations. Below, you can catch the recorded streams of the events, as well as the decks coming from each talk where applicable.

Wi-Fi Hacking: Who Hacks Wi-Fi & What Tools Do They Use?

By Kody Kinzie

Kody Kinzie speaks on Wi-Fi hacking threats in 2017. Image via Null Byte

Use of Wi-Fi can be incredibly widespread in 2017. inside the city of Los Angeles alone, there are hundreds of thousands of wireless networks, many of which touch critical infrastructure. Kody Kinzie can be a CS student researching Wi-Fi security, in addition to also the tactics people use to break This kind of.

Kody explains the tactics currently used to break or bypass the technology in which makes Wi-Fi secure, in addition to also the motivations behind groups who hack Wi-Fi in 2017. In addition, the basic tools used by each threat group are discussed relative to how much skill can be required to use them.

Evil Twin: Capturing WPA Passwords by Targeting Users having a Fluxion Attack

Custom Wordlists: How to Crack Passwords, Creating a Custom Wordlist with Crunch

Reaver Attacks: Hack WPA Wi-Fi Passwords by Cracking the WPS PIN

MITM Attacks: Network Sniffing Over Routers/Switches

By Ian O’Neill

Ian O’Neill explains MITM attacks to computer science students. Image via Null Byte

Man inside the Middle attacks intercept in addition to also redirect traffic, in addition to also can be extremely dangerous when employed correctly. Ian O’Neill explains in detail the fundamentals of a MITM attack, coming from creating a fake network to downgrading HTTPS connections to HTTP.

MITM attacks continue to present a viable threat when users fall for phishing in addition to also ignore warnings, in spite of the trend towards HTTPS in addition to also more secure internet connections. Take a trip to the dark side with us to explore the hands-on ways an attacker can employ an effective MITM attack.

Check out these related articles:

MTIM Tools: Build a Man-in-the-Middle Tool with Scapy in addition to also Python

MITM Attacks: How to Conduct a Simple Man-in-the-Middle Attack

MITM Framework: Build a Pumpkin Pi — The Rogue AP & MITM Framework in which Fits in Your Pocket

Rogue Devices: Antivirus Disabler Script on the USB Rubber Ducky

By Tim Schellin

Tim demonstrates a USB Rubber Ducky payload. Image via Null Byte

Antivirus can be the first line of defense for most systems, allowing even well-crafted malware to be defeated before deploying a payload. Timothy Shellion can be a CS student using the USB Rubber Ducky to design payloads to defeat antivirus, in addition to also explains what a rogue device like a USB Rubber Ducky can be, in addition to also how This kind of works.

Timothy demonstrates his simple Duckyscript code to disable antivirus on Windows, in addition to also explains how the device can be used to defeat even well-defended systems when physical access can be achieved. The potential of This kind of device reach far beyond simply disabling antivirus, in addition to also the process of creating a payload for a rogue device can be explained.

Steal Files: Steal macOS Files with the USB Rubber Ducky

Custom Firmware: Modify the USB Rubber Ducky with Custom Firmware

Want More Video Content?

If you enjoyed This kind of in addition to also would certainly like to see more video content, let us know inside the comments below. Thank you to Null Space Labs, in addition to also Pasadena Computer Science Club for helping us put on our first Null Byte event. If you’re inside the SoCal area in addition to also interested in getting involved in our of our talks or workshops, please reach out to us on Twitter!

Cover photo by Null Byte

Leave a Comment

Your email address will not be published. Required fields are marked *

one × three =