We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

BYOD PEAP Show

00:00

Formal Metadata

Title
BYOD PEAP Show
Title of Series
Number of Parts
112
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
The onslaught of Bring Your Own Device(s) in recent years places a new focus on the security of wireless networks. In "The BYOD PEAP Show", Josh Yavor explores fundamental flaws in one of the most common and widely supported 802.1x authentication protocols used by countless corporate WPA2-Enterprise networks today. A series of events in the recent past created a situation in which PEAP can no longer be used safely. In this talk, we will re-trace this path and investigate how the combination of BYOD, new technology and new tools led to this situation. A live demonstration with audience participation will punctuate the danger of supporting PEAP. Attendees will leave with an understanding of the underlying flaws, methods of exploitation, a set of tools and most importantly, how to secure WPA2-Enterprise networks that currently support PEAP. A new tool, peapshow, will be released after DEF CON and will make testing and exploitation of this issue truly trivial. Besides, this is DEF CON. Someone has to mess with the WiFi. Josh Yavor (@schwascore) is a Security Engineer at iSEC Partners, an information security firm specializing in application, network, and mobile security. At iSEC, Josh specializes in web application security and network penetration testing. Josh holds a MS in Computer, Information and Network Security from DePaul University. At DePaul, he focused on network security while also developing an interest in incident response and SCADA/ICS. Prior to working at iSEC, Josh operated an independent IT consulting and managed services business with a special focus on security related projects.
23
65
108
Mobile WebMultiplication signInformation securityDisk read-and-write headMobile WebWireless LAN
Perfect groupEAP-ProtokollRadio-frequency identificationInfinite conjugacy class propertyType theoryEnterprise architectureAuthenticationServer (computing)RadiusReal numberIntegrated development environmentGroup actionConnectivity (graph theory)Event horizonSingle-precision floating-point formatGraph (mathematics)BitSelf-organizationNumberSubsetDefault (computer science)Enterprise architecturePhysical systemComputer networkFreewareAuthenticationInformation securityService (economics)Integrated development environmentServer (computing)Public key certificateRadiusFigurate numberProper mapStandard deviationSoftware testingConfiguration spaceValidity (statistics)ResultantPatch (Unix)Data managementReal numberMobile WebDependent and independent variablesEmailPasswordType theorySoftware developerMultiplication signWordMetric systemForm (programming)MathematicsComputer networkCommunications protocolMobile appComputerMereologyProduct (business)Point cloudRandomizationDomain nameDirectory serviceEquivalence relationOrder (biology)Shape (magazine)Operating systemMatching (graph theory)Right angle
Real numberIntegrated development environmentGroup actionSelf-organizationPasswordPosition operatorComputer networkGroup actionGame controllerComplete metric spaceLecture/Conference
Multiplication sign2 (number)TrailCountingLine (geometry)Renewal theorySinc functionNumberLevel (video gaming)BitComputer animation
User interfaceComputer networkSystem administratorVapor barrierMedical imagingComputer networkService (economics)InternetworkingDomain nameDirectory serviceMobile WebElectronic program guideEnterprise architectureMetric systemSelf-organizationMultiplication signConfiguration spaceLine (geometry)Profil (magazine)Software testingMultilaterationBitMathematicsGroup actionWebsiteFigurate numberDependent and independent variablesNumberType theoryInformation securityEmailProcess (computing)Uniform resource locatorPoint (geometry)Computing platformoutputAgreeablenessBounded variation
SicType theorySelf-organizationUniverse (mathematics)Computer networkStaff (military)Likelihood functionWikiWireless LANEnterprise architecture
Mobile WebLinear programmingRevision controlPublic key certificateWindowTouchscreenConfiguration spaceMobile WebUniverse (mathematics)ResultantAndroid (robot)
AuthenticationServer (computing)EncryptionHost Identity ProtocolLoginData typeWindows PhoneTransport Layer SecurityINTEGRALAuthorizationComputer networkProbability density functionClient (computing)Computer configurationForceEnterprise architecturePhysical systemPLS (file format)Wechselseitige InformationBitGreatest elementType theoryPublic key certificateMobile WebAuthenticationWindowServer (computing)Computing platformSet (mathematics)Operating system1 (number)TouchscreenInformationSelf-organizationTransport Layer Security
ZugriffskontrolleLocal GroupPairwise comparisonWireless LANAuthenticationMetropolitan area networkOpen setDependent and independent variablesError messageMathematicsPasswordMessage passingFamilyAssociative propertyEnterprise architectureSelf-organizationPoint (geometry)Goodness of fitComputer networkDifferent (Kate Ryan album)Game controllerPasswordOpen setSymmetric-key algorithm
Identity managementAssociative propertyRadiusServer (computing)Mobile WebInterior (topology)AuthenticationRadiusPublic key certificateDependent and independent variablesMereologyRootOrder (biology)Client (computing)Identity managementMultiplication signExploit (computer security)Point (geometry)Server (computing)AuthenticationReal numberFreewareIdentifiabilityComputing platformBuildingMobile WebAssociative property
Mobile WebComputing platformAndroid (robot)Mobile WebComputing platformSoftware testingType theorySelf-organizationAndroid (robot)outputIntegrated development environmentDifferent (Kate Ryan album)Metric systemWindowSet (mathematics)Enterprise architectureArea
Type theoryAndroid (robot)AuthenticationComputer networkConfiguration spaceComputer configurationDifferent (Kate Ryan album)Phase transitionOrder (biology)Public key certificateMereologyoutputType theoryExtension (kinesiology)Transport Layer SecuritySoftware developerEnterprise architectureSoftware testingValidity (statistics)RootGoodness of fitDefault (computer science)Server (computing)User interfaceRadiusAndroid (robot)
PasswordServer (computing)outputConfiguration spaceFeedbackMereologyProfil (magazine)Operating systemPublic key certificatePassword
Normed vector spaceEmailSelf-organizationStorage area networkPublic key certificatePasswordType theoryServer (computing)Self-organizationPublic key certificateDefault (computer science)RadiusFreewareFlagMultiplication signTouchscreenMotion captureComputing platformDifferent (Kate Ryan album)Type theoryInformationIntegrated development environment
Greatest elementConfiguration spacePublic key certificateWindowProfil (magazine)Default (computer science)Validity (statistics)Right angle
Windows PhoneFigurate numberPresentation of a groupConfiguration spacePasswordDefault (computer science)User interfaceComputer configurationValidity (statistics)Suite (music)Public key certificateServer (computing)
Windows PhoneSingle-precision floating-point formatComputer networkBuildingPersonal identification numberPublic key certificateComputing platformInformation securityNumberWindowEnterprise architectureDifferent (Kate Ryan album)Table (information)Type theoryTransport Layer SecurityComputer animation
BuildingSingle-precision floating-point formatComputer networkElectronic mailing listPhysicalismMultiplication signPoint (geometry)Self-organizationTrans-European NetworksSoftware testingType theoryBuildingRadiusElectronic mailing listService (economics)Information securityComputer networkDirectory serviceBroadcasting (networking)Order (biology)Uniform resource locatorGroup actionServer (computing)Computer networkTransportation theory (mathematics)AreaFreewarePower (physics)Universe (mathematics)Router (computing)Regular graphPlastikkarteLaptopComputer clusterStandard deviationComputing platformDependent and independent variablesLikelihood functionPhysical systemReal numberMultiplicationWireless LANMoving averageGoodness of fitThomas BayesRight anglePersonal identification numberOpen setConfiguration spaceScripting languageMereologyWebsiteMobile WebWordCartesian coordinate systemFerry CorstenMatching (graph theory)Basis <Mathematik>
Radon transformScripting languageDisintegrationSingle-precision floating-point formatAerodynamicsComputer networkSingle-precision floating-point formatGame controllerWordIntrusion detection systemRotationLogicBitComputer networkFigurate numberEnterprise architectureGroup actionElectronic mailing listScripting languageTurbo-CodeOpen setInstallation artVector potential
Mobile WebData managementBroadcasting (networking)InternetworkingComputer networkInformation securityPairwise comparisonData managementTransport Layer SecurityMobile WebSelf-organization
AuthenticationMobile WebData managementRight angleDifferent (Kate Ryan album)PLS (file format)Demo (music)Multiplication signRight angleInformation securityPoint (geometry)Order (biology)Computer networkPasswordTransport Layer Security
Wireless LANHacker (term)Dependent and independent variablesService (economics)PasswordMotion captureoutputRight anglePublic key certificateDemo (music)Service (economics)LaptopMetropolitan area networkMobile WebPasswordInternetworkingFood energyMultiplication signInformation securityLecture/ConferenceComputer animation
Hausdorff spaceEmailComputer networkElectronic visual displayMotion captureAnalogyMenu (computing)Computer clusterIP addressRight angleObject-oriented programmingBackupPublic key certificateConnected spaceTouchscreenComputer animationSource code
Information securityTouchscreenMultiplication signPublic key certificateFunction (mathematics)Goodness of fit2 (number)Right angleDirectory serviceLoginComputer animation
Message passing
Transcript: English(auto-generated)