Presentation Material
Abstract
WPA/WPA2 cracking primarily consists of dictionary based attacks. Dictionary attacks are just as good as the wordlist one has and the availability of sufficient compute power to iterate through it. A few years back it was unimaginable how one could launch a dictionary attack which tries a billion combinations within a practical timeframe but now with the advent of Cloud Computing, compute resource is no longer a prized commodity. In this talk will explore how to use different cloud services to crack WPA/WPA2 Personal and Enterprise!
AI Generated Summarymay contain errors
Here is a summary of the content:
The speaker is discussing Wi-Fi security, specifically how to crack MSCHAPv2 credentials using a honeypot and man-in-the-middle attacks. They mention a 40-part video series on SecurityTube.net that covers this topic. The speaker notes that cracking MSCHAPv2 credentials is relatively simple and can be done quickly using a word list.
The conversation then shifts to a discussion about cloud-based infrastructure, specifically Amazon Web Services (AWS). The speaker mentions using AWS services such as EC2 instances, S3 storage, and RDS databases. They note that data transfer within AWS is free, but bandwidth costs would apply if part of the setup were outside of AWS.
The speaker also compares AWS to Google Compute Engine, noting that AWS provides more flexibility in customizing the infrastructure, including kernel-level customization. They mention using tiny core Linux to create a small footprint image for their workers, which can run on AWS.
Overall, the conversation is focused on Wi-Fi security and cloud-based infrastructure, with an emphasis on the tools and techniques used to crack MSCHAPv2 credentials and the benefits of using AWS services.