Hacking the RSA Wireless Network: Bring Your A Game
Hacking the RSA Wireless Network: Bring Your A Game
I’m attending the RSA Conference this week. Right now I’m writing from the conference floor. The event looks to be amazing, with a great speaker line-up and really strong attendance. I can’t wait for the sessions to get fully underway.
This year the conference is providing free, unsecured wireless networking to all attendees. Yes, free and unsecured wireless access. In this screenshot you can see the official wireless network is the only unsecured network.
Figure 1. An invitation to hackers.
This is pretty darn easy to compromise for most attackers. I’d expect it to be thoroughly compromised in short order. And true to that, there’s an attack being conducted right now.
Sadly, the attacker is simply usurping the wireless network’s SSID. No DHCP server, no DNS server, no traffic redirection. Nothing.
Frankly I’m disappointed. If you’re going to hack the wireless network at the world’s biggest security conference, with the brightest security minds in attendance, at least show the courtesy of engineering a proper attack.
Until next time:
Mike Danseglio -CISSP / CEH
Interface Technical Training – Technical Director and Instructor
You May Also Like
RSA, RSA 2013, Security, SSID, traffic redirection, unsecured wireless, wireless
Agile Methodology in Project Management
0 162 0In this video, you will gain an understanding of Agile and Scrum Master Certification terminologies and concepts to help you make better decisions in your Project Management capabilities. Whether you’re a developer looking to obtain an Agile or Scrum Master Certification, or you’re a Project Manager/Product Owner who is attempting to get your product or … Continue reading Agile Methodology in Project Management
Windows 10 Features and Navigation – December 1, 2015
0 120 1In this recorded Windows 10 webinar from December 1,2015, Windows Instructor Steve Fullmer presents the navigation and some of the new features associated with Windows 10 including Sysinternals Tools for Windows Client, Windows core concepts, exploring Process Explorer as well as some of the features that are not yet ready for prime time but will … Continue reading Windows 10 Features and Navigation – December 1, 2015
Detailed Forensic Investigation of Malware Infections – April 21, 2015
4 647 5How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015