The .11 Veil, Camouflage & Covert!!! Invisible Wifi, Revealed

By Rushikesh D Nandedkar , Amrita C Iyer on 08 Oct 2015 @ Brucon
πŸ“Š Presentation πŸ“Ή Video πŸ”— Link
#wifi #network-pentesting #security-testing #threat-modeling #incident-management
Focus Areas: πŸ” Application Security , βš™οΈ DevSecOps , 🚨 Incident Response , 🌐 Network Security , πŸ—οΈ Security Architecture

Presentation Material

AI Generated Summary

The talk focuses on the topic of covert communication in wireless networks, specifically in the context of Wi-Fi. The researchers presented their findings on how to exploit weaknesses in the 802.11 protocol to establish a covert channel, allowing for the transfer of data between devices without being detected by traditional security measures.

The researchers proposed three approaches to achieve covert communication: LT Euphoria, Patch Peloton, and another approach that involves modifying the network drivers. The LT Euphoria approach involves using the Traffic Indication Map (TIM) field in beacon frames to send data, while the Patch Peloton approach involves patching the network drivers to enable covert communication.

The researchers demonstrated the feasibility of their approaches and discussed the advantages and limitations of each method. They also highlighted the potential risks and implications of their findings, including the possibility of malware transmission and the need for improved security measures to detect and prevent such covert communication.

The key takeaways from the talk include:

  • The existence of weaknesses in the 802.11 protocol that can be exploited for covert communication
  • The feasibility of establishing a covert channel using the TIM field in beacon frames or by patching network drivers
  • The potential risks and implications of covert communication in wireless networks, including malware transmission and evasion of security measures
  • The need for improved security measures to detect and prevent covert communication in wireless networks.
Disclaimer: This summary was auto-generated from the video transcript using AI and may contain inaccuracies. It is intended as a quick overview β€” always refer to the original talk for authoritative content. Learn more about our AI experiments.