Your SlideShare is downloading. ×
DefCon 2012 - Subterfuge - Automated MITM Attacks
DefCon 2012 - Subterfuge - Automated MITM Attacks
DefCon 2012 - Subterfuge - Automated MITM Attacks
DefCon 2012 - Subterfuge - Automated MITM Attacks
DefCon 2012 - Subterfuge - Automated MITM Attacks
DefCon 2012 - Subterfuge - Automated MITM Attacks
DefCon 2012 - Subterfuge - Automated MITM Attacks
DefCon 2012 - Subterfuge - Automated MITM Attacks
DefCon 2012 - Subterfuge - Automated MITM Attacks
DefCon 2012 - Subterfuge - Automated MITM Attacks
DefCon 2012 - Subterfuge - Automated MITM Attacks
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

DefCon 2012 - Subterfuge - Automated MITM Attacks

703

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
703
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
11
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Christopher  M.  Shields    r00t0v3rr1d3      Ma1hew  M.  Toussain      0sm0s1z    
  • 2. Chris –Custom Attack Tools and ProjectManagement Matt –Interface Design and FrameworkDevelopment
  • 3. Basic ARP Poison
  • 4. Heavy Network Traffic Python Tool With ScapyPeriods of MITM Loss Intelligent Network Poison Dynamic Poison Retention
  • 5. Ø HTTPS Downgrade AttackØ Use as a Web ProxyØ Customizations for Subterfuge
  • 6. A New MITM Tool –Ø  Intuitive InterfaceØ  Easy to useØ  Silent and StealthyØ  Open Source
  • 7. Ø  Server/Client ArchitectureØ  MITM UtilitiesØ  Module BuilderØ  Configuration Options
  • 8. Ø Credential HarvestingØ HTTP Code InjectionØ Denial of ServiceØ Network View
  • 9. ?? ?

×