DefCon 2012 - Subterfuge - Automated MITM Attacks

1,037 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,037
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
11
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

DefCon 2012 - Subterfuge - Automated MITM Attacks

  1. 1. Christopher  M.  Shields    r00t0v3rr1d3      Ma1hew  M.  Toussain      0sm0s1z    
  2. 2. Chris –Custom Attack Tools and ProjectManagement Matt –Interface Design and FrameworkDevelopment
  3. 3. Basic ARP Poison
  4. 4. Heavy Network Traffic Python Tool With ScapyPeriods of MITM Loss Intelligent Network Poison Dynamic Poison Retention
  5. 5. Ø HTTPS Downgrade AttackØ Use as a Web ProxyØ Customizations for Subterfuge
  6. 6. A New MITM Tool –Ø  Intuitive InterfaceØ  Easy to useØ  Silent and StealthyØ  Open Source
  7. 7. Ø  Server/Client ArchitectureØ  MITM UtilitiesØ  Module BuilderØ  Configuration Options
  8. 8. Ø Credential HarvestingØ HTTP Code InjectionØ Denial of ServiceØ Network View
  9. 9. ?? ?

×