SlideShare is now on Android. 15 million presentations at your fingertips.  Get the app

×
  • Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
 

Attacking and Securing WPA Enterprise Networks

by on Apr 19, 2010

  • 12,297 views

This presentation covers different attacks that can be leveraged against wireless networks using Enterprise (802.1x) authentication. Attendees will learn about and see demonstrations of these attacks, ...

This presentation covers different attacks that can be leveraged against wireless networks using Enterprise (802.1x) authentication. Attendees will learn about and see demonstrations of these attacks, many of which can be used to reveal the credentials used to join the wireless network. The presentation concludes with recommendations on how to defend against these attacks.

Matt Neely (CISSP, CTGA, GCIH and GCWN) is the Profiling Team Manager at SecureState, a Cleveland Ohio based security consulting company. At SecureState, Matt and his team perform traditional penetration tests, physical penetration tests, web application security reviews and wireless security assessments. His research interests include the convergence of physical and logical security, cryptography and all things wireless. Matt is also a host on the Security Justice podcast.

Statistics

Views

Total Views
12,297
Views on SlideShare
11,497
Embed Views
800

Actions

Likes
4
Downloads
267
Comments
0

9 Embeds 800

http://www.scoop.it 367
http://www.neoisf.org 356
https://twitter.com 48
http://www.slideshare.net 18
http://tweetedtimes.com 3
http://www.google.ch 3
http://translate.googleusercontent.com 2
http://webcache.googleusercontent.com 2
http://www.google.com 1
More...

Accessibility

Categories

Upload Details

Uploaded via SlideShare as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
Post Comment
Edit your comment

Attacking and Securing WPA Enterprise Networks Attacking and Securing WPA Enterprise Networks Presentation Transcript