WPA broken PACSEC 2008 + Aircrack PTW
According to the references Mark Tew and Martin Beck will present a way how to pass TKIP (Temporal Key Integrity Protocol), that is know as the one that uses a dynamic key generation for each of data block. The time needed for successful WPA cracking is 12 to 15 minutes. So don’t forget to check fresh materials from the PACSEC 2008 conference. The details will be published also here at Remote Security.
Topics presented at PacSec conference
Putting an SSH server in your NIC - Arrigo Trulzi
Gone in 900 Seconds, Some Crypto Issues with WPA - Erik Tews
Browser Memory Protection Bypasses: Virtual Machines - Mark Dowd, IBM
Cross domain leakiness: Divulging sensitive information and attacking SSL sessions - Chris Evans & Billy Rios, Google, Microsoft
Flash XSS - Rich Cannings, Google
Malicious origami in PDF - Fredric Raynal, Guillaume Delugre
Security for Virtual and Physical Server Environment - Akiko Takahashi
Living in the RIA World (Flash/Air, Silverlight, Gears, Prism, BrowserNow, HTML5) - David Thiel, iSec
Understanding Cross-Domain Models and Threats - Peleus Uhley, Adobe
Gaining access through Kerberos - Emmanuel Bouillon
A new web attack vector: Script Fragmentation - Stephan Chenette, WebSense
Countermeasure to SSH Brute Force Attack according to behaviour - Tetsuo Handa
Advances in Automated Attack Planning - Carlos Sarraute & Alejandro David Weil, Core
Inside “Winnyp”, Winnyp Internals and Concepts of Network Crawling - Toshiaki Ishiyama, FourteenfortyAircrack-PTW
It was released a better and faster implemantation for breaking WEP secutiry known as Aircrack-PTW. New minimum of the IV’s neede for successful 128 bit key recovery is 19 000 IV. Source code available at SVN. All tools are at your disposal at rootu. The implementaion is of course in the latest SVN version Aircrack-NG.a
Category:
0 Komentar