We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Guests 'N Goblins: Exposing Wi-Fi Exfiltration Risks and Mitigation Techniques

00:00

Formal Metadata

Title
Guests 'N Goblins: Exposing Wi-Fi Exfiltration Risks and Mitigation Techniques
Title of Series
Number of Parts
109
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Wi-Fi is a pervasive part of everyone’s everyday life. Whether it be home networks, open hotspots at cafés, corporate networks or corporate guest networks they can be found virtually everywhere. Fortunately, for the security minded, some steps are taken to secure these weak points in one’s infrastructure. Usually this is done through some form of registration page which is common in the case of guest networks. But is this enough? And what new threats could be unleashed from even the most isolated of Wi-Fi networks? In the most paranoid of cases, companies will generally attempt to isolate Wi-Fi networks from their official networks in order to protect their own assets from attacks, while still ensuring that Wi-Fi is convenient for end users. But there is another way to attack a company that could be damaging to the host company and harmful to other targets. This presentation will go over the utilization of various techniques of getting onto and getting out through publicly accessible Wi-Fi networks for nefarious purposes, termed Wi-Fi Exfiltration. Through this technique one is able to obfuscate their identity by using the host of the Wi-Fi’s identity, thus implicating the host in the attack. During the presentation we will cover the findings through our tests along with a list of recommendations for what can be done to mitigate this risk. This is a must attend session to all security professionals and high level management. Speaker Bios: Peter Desfigies is a Security Consultant at TELUS Communications Inc. where he works with a team of other operations analysts to proactively investigate and analyze customer traffic, while also providing threat intelligence on attacks, campaigns, and zero-days in order to protect customer’s environment and enhance their security posture. During his time at TELUS, he has worked with a variety of teams providing LAN, WAN, Telco, Security and hardware break/fix support, and now Security Analysis for government and corporate customer. Prior to TELUS, he worked for 12 years in IT operation roles to provide backbone network support including DNS, SMTP, POP, dialup, T1 to OC12 , and Ethernet at various companies, with the bulk of his experience at UUNET / MCI. Joshua Brierton is a Sr. Security Analyst at TELUS Communications Inc. where he works with a team of SIEM specialists to provide customers with a cloud SIEM service offering. Primarily working on rule development and user work flows his other interests in the field includes developing tools to help automate and expedite repetitive work to increase user efficiency. During his time at TELUS he has worked with various teams providing security solutions from VPN services to IPS services along with outsourced development for a variety of other well-known SIEM’s. Prior to TELUS he worked for 5 years with Intellitactics Inc. doing development and device support for the content of the SIEM they provided. Collectively Josh has been working with a variety of SIEM’s for 10 years. Naveed Ul Islam (BEE Telecom/DSP, CISSP, SABSA-SCF) is a Managing Consultant at TELUS and Security Intelligence architect within the TELUS Cyber Security Investigation Unit. Naveed’s other interests are in application forensics and enterprise security architecture. Naveed’s prior duties with TELUS include securing of then world’s largest PKI infrastructure known as Secure Channel. In addition, he was responsible for secure implementation of TELUS Health Space infrastructure. He led application security practices within TELUS Health, where he was able to incorporate software security lifecycle into software development practices. Also, he has been a part of security incident response and penetration testing teams. Previous to TELUS, Naveed was a security consultant for Microsoft USA, where he performed security and privacy audits of Microsoft’s core-business related websites. He has secured several key sites such as Microsoft XBOX 360 host web site and Microsoft’s internal auction site known as Micronews.
Mathematical singularityTelecommunicationRepresentation (politics)Presentation of a group
Insertion lossPole (complex analysis)Control flowMathematical analysisIdentity managementComputer networkJava appletCrash (computing)GoogolSoftware development kitAsynchronous Transfer ModeAreaRevision controlPort scannerPoint (geometry)Simultaneous localization and mappingIP addressMobile appAnalytic setInternet service providerProcess (computing)Multiplication signTouchscreenRight angleServer (computing)Projective planeDisk read-and-write headFingerprintEvent horizonTraffic reportingSoftware repositoryConnected spaceSuite (music)EncryptionResultantCodeFormal verificationAddress spaceDefault (computer science)Ocean currentStapeldateiWeb pageSoftwareInformation securityAnnihilator (ring theory)Insertion lossMassIdentity managementMereologyAreaCrash (computing)Electronic mailing listEmailPort scannerSpacetimeComputer networkForm (programming)Open setFerry CorstenPresentation of a groupQuicksortScripting languageProxy serverFluid staticsType theoryMathematical analysisData storage deviceObject (grammar)Uniform resource locator
Point (geometry)Uniform resource locatorSampling (statistics)Presentation of a groupInformationBasis <Mathematik>Wireless LANDiagram
InformationMobile appSoftwareSpherical capTouchscreenResultantScripting languagePlastikkarteMultiplicationPoint (geometry)
Channel capacityQuicksortBitDemo (music)
DatabaseLine (geometry)Phase transitionServer (computing)ParsingResultantConfiguration spaceRange (statistics)Traffic reportingPhase transitionDatabaseDisk read-and-write headComputer networkCombinational logicConnected spaceGateway (telecommunications)Module (mathematics)
Set (mathematics)Sheaf (mathematics)Intrusion detection systemAsynchronous Transfer ModeAddress spaceAuthorizationGateway (telecommunications)Cellular automatonMobile appEncryption
InformationServer (computing)Sheaf (mathematics)Visualization (computer graphics)Gateway (telecommunications)MereologyLecture/Conference
InformationClient (computing)Server (computing)Table (information)Dependent and independent variablesRange (statistics)Instance (computer science)Port scannerCentralizer and normalizerObject (grammar)Front and back endsDatabaseWeb 2.0Real-time operating systemSoftware frameworkMereologyAddition
MereologyServer (computing)Multiplication signInternetworkingFingerprintClient (computing)Range (statistics)Reverse engineeringResultantComputer animation
Instance (computer science)Goodness of fitTouchscreenElectronic visual displayComputer animation
2 (number)Instance (computer science)Computer fileCoordinate systemLecture/ConferenceComputer animation
ResultantComputer configurationPhysical systemComputer fileComputer animation
InformationPlotterSlide ruleWeb pageComputer fileWide area networkSoftwareComputer animation
Greatest common divisorFerry CorstenWave packetSampling (statistics)Workstation <Musikinstrument>QuicksortWeb pagePoint (geometry)Endliche ModelltheorieRandomizationSource code
Large eddy simulationFerry CorstenPoint (geometry)MereologyServer (computing)Client (computing)Scripting languageComputer animation
Server (computing)CodeSocket-SchnittstelleWeb 2.0Client (computing)Scripting languageElectronic mailing listMappingSource code
Local ringInstance (computer science)Range (statistics)Web 2.01 (number)Socket-SchnittstelleServer (computing)Computer animation
Firewall (computing)Hausdorff spacePort scannerClient (computing)Web browserFirewall (computing)Intrusion detection systemPoint (geometry)Presentation of a groupQuicksortInformationMultiplication signSoftwareLine (geometry)Cartesian coordinate systemTunisBasis <Mathematik>SimulationServer (computing)Information securityPower (physics)LoginWireless LANRight angleCommunications protocolProduct (business)Computer animation
QuicksortElectronic mailing listDirect numerical simulationLecture/Conference
Real-time operating systemScripting languageFunction (mathematics)Traffic reportingWeb browserJava appletInformation securityoutputDisintegrationTwitterIP addressLevel (video gaming)Numerical integrationOpen setSheaf (mathematics)Table (information)Letterpress printingAutomationBitServer (computing)EmailPoint (geometry)CodeInjektivitätAuthenticationPerspective (visual)SoftwareInformationAndroid (robot)Product (business)Information securityReal-time operating systemGastropod shellHacker (term)QuicksortAuthorizationPairwise comparisonSoftware testingPort scannerPlanningLibrary (computing)Scripting languageDefault (computer science)Mobile appModule (mathematics)Internet service providerPhysical systemSource codeWeb applicationFerry CorstenFingerprintAlgorithmWebsiteAdditionTrailRobotClient (computing)Software framework
Transcript: English(auto-generated)