filmov
tv
DEF CON 24 - Grant Bugher - Bypassing Captive Portals and Limited Networks
Показать описание
Common hotspot software like Chilispot and Sputnik allow anyone to set up a restricted WiFi router or Ethernet network with a captive portal, asking for money, advertising, or personal information in exchange for access to the Internet. In this talk I take a look at how these and similar restrictive networks work, how they identify and restrict users, and how with a little preparation we can reach the Internet regardless of what barriers they throw up.
Bio:
Grant Bugher has been hacking and coding since the early 90’s and working professionally in information security for the last 12 years. He is currently a security engineer for a cloud service provider, and has previously been an architect, program manager and software engineer on a variety of online services, developer tools and platforms. Grant is a prior speaker at BlackHat and DEF CON and a regular DEF CON attendee since DEF CON 16. Most of his research and work is on cloud computing and storage platforms, application security, and detecting & investigating attacks against web-scale applications.
Bio:
Grant Bugher has been hacking and coding since the early 90’s and working professionally in information security for the last 12 years. He is currently a security engineer for a cloud service provider, and has previously been an architect, program manager and software engineer on a variety of online services, developer tools and platforms. Grant is a prior speaker at BlackHat and DEF CON and a regular DEF CON attendee since DEF CON 16. Most of his research and work is on cloud computing and storage platforms, application security, and detecting & investigating attacks against web-scale applications.
DEF CON 24 - Grant Bugher - Bypassing Captive Portals and Limited Networks
DEF CON 24 - Grant Bugher - Bypassing Captive Portals and Limited Networks
Hacking challenge at DEFCON
DEF CON 24 SE Village - Mattias Borg - SCAM CALL : Call Dropped
DEF CON 24 Wireless Village - Kat Sweet - I Amateur Radio And So Can You
DEF CON 24 - Delta Zero, KingPhish3r - Weaponizing Data Science for Social Engineering
DEF CON 24 - Fred Bret Mounet - All Your Solar Panels are belong to Me
DEF CON 24 - Ricky 'HeadlessZeke' Lawshae - Network Attacks Against Physical Security Syst...
DEF CON 22 - Grant Bugher - Detecting Bluetooth Surveillance Systems
DEF CON 23 - Grant Bugher - Obtaining and Detecting Domain Persistence
DEF CON 24 SE Village - James Powell - You Are Being Manipulated
DEF CON 24 - Jay Healey - Feds and 0Days: From Before Heartbleed to After FBI Apple
DEF CON 24 - Lucas Lundgren, Neal Hindocha - Light Weight Protocol: Critical Implications
DEF CON 24 - Zero Chaos and Granolocks - Realtime bluetooth device detection Blue Hydra
DEF CON 24 - Alex Chapman and Paul Stone - Toxic Proxies: Bypassing HTTPS
DEF CON 24 - Jake Kouns - Cyber Who Done It: Attribution Analysis Through Arrest History
DEF CON 24 Wireless Village - Gabriel Ryan - Slaving Rogue Access Points w/ Python & Cheap Hardw
DEF CON 24 - Mudge Zatko and Sarah Zatko - Project CITL
DEF CON 24 - ashmastaflash - SITCH:Inexpensive Coordinated GSM Anomaly Detection
DEF CON 24 Conference - Aaron Luo - Drones Hijacking: Multidimensional attack vectors and countermea
DEF CON 24 - Luke Young - Attacking Network Infrastructure to Generate a 4 Tbs DDoS
DEF CON 24 - Mickey Shkatov, Panel How to Make Your Own DEF CON Black Badge
DEF CON 32 - Top War Stories from a TryHard Bug Bounty Hunter -Justin Rhynorater Gardner
DEF CON 23 - Priest - Impromptu Spot the Fed
Комментарии