DefCon 2012 - Subterfuge - Automated MITM Attacks
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

DefCon 2012 - Subterfuge - Automated MITM Attacks

on

  • 1,141 views

 

Statistics

Views

Total Views
1,141
Views on SlideShare
1,138
Embed Views
3

Actions

Likes
0
Downloads
10
Comments
0

1 Embed 3

http://storify.com 3

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

CC Attribution-NonCommercial-ShareAlike LicenseCC Attribution-NonCommercial-ShareAlike LicenseCC Attribution-NonCommercial-ShareAlike License

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

DefCon 2012 - Subterfuge - Automated MITM Attacks Presentation Transcript

  • 1. Christopher  M.  Shields    r00t0v3rr1d3      Ma1hew  M.  Toussain      0sm0s1z    
  • 2. Chris –Custom Attack Tools and ProjectManagement Matt –Interface Design and FrameworkDevelopment
  • 3. Basic ARP Poison
  • 4. Heavy Network Traffic Python Tool With ScapyPeriods of MITM Loss Intelligent Network Poison Dynamic Poison Retention
  • 5. Ø HTTPS Downgrade AttackØ Use as a Web ProxyØ Customizations for Subterfuge
  • 6. A New MITM Tool –Ø  Intuitive InterfaceØ  Easy to useØ  Silent and StealthyØ  Open Source
  • 7. Ø  Server/Client ArchitectureØ  MITM UtilitiesØ  Module BuilderØ  Configuration Options
  • 8. Ø Credential HarvestingØ HTTP Code InjectionØ Denial of ServiceØ Network View
  • 9. ?? ?