DefCon 2012 - Subterfuge - Automated MITM Attacks

  • 662 views
Uploaded on

 

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
662
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
10
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Christopher  M.  Shields    r00t0v3rr1d3      Ma1hew  M.  Toussain      0sm0s1z    
  • 2. Chris –Custom Attack Tools and ProjectManagement Matt –Interface Design and FrameworkDevelopment
  • 3. Basic ARP Poison
  • 4. Heavy Network Traffic Python Tool With ScapyPeriods of MITM Loss Intelligent Network Poison Dynamic Poison Retention
  • 5. Ø HTTPS Downgrade AttackØ Use as a Web ProxyØ Customizations for Subterfuge
  • 6. A New MITM Tool –Ø  Intuitive InterfaceØ  Easy to useØ  Silent and StealthyØ  Open Source
  • 7. Ø  Server/Client ArchitectureØ  MITM UtilitiesØ  Module BuilderØ  Configuration Options
  • 8. Ø Credential HarvestingØ HTTP Code InjectionØ Denial of ServiceØ Network View
  • 9. ?? ?