• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
DefCon 2012 - Subterfuge - Automated MITM Attacks
 

DefCon 2012 - Subterfuge - Automated MITM Attacks

on

  • 1,060 views

 

Statistics

Views

Total Views
1,060
Views on SlideShare
1,057
Embed Views
3

Actions

Likes
0
Downloads
10
Comments
0

1 Embed 3

http://storify.com 3

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

CC Attribution-NonCommercial-ShareAlike LicenseCC Attribution-NonCommercial-ShareAlike LicenseCC Attribution-NonCommercial-ShareAlike License

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    DefCon 2012 - Subterfuge - Automated MITM Attacks DefCon 2012 - Subterfuge - Automated MITM Attacks Presentation Transcript

    • Christopher  M.  Shields    r00t0v3rr1d3      Ma1hew  M.  Toussain      0sm0s1z    
    • Chris –Custom Attack Tools and ProjectManagement Matt –Interface Design and FrameworkDevelopment
    • Basic ARP Poison
    • Heavy Network Traffic Python Tool With ScapyPeriods of MITM Loss Intelligent Network Poison Dynamic Poison Retention
    • Ø HTTPS Downgrade AttackØ Use as a Web ProxyØ Customizations for Subterfuge
    • A New MITM Tool –Ø  Intuitive InterfaceØ  Easy to useØ  Silent and StealthyØ  Open Source
    • Ø  Server/Client ArchitectureØ  MITM UtilitiesØ  Module BuilderØ  Configuration Options
    • Ø Credential HarvestingØ HTTP Code InjectionØ Denial of ServiceØ Network View
    • ?? ?