Star 0

Abstract


Gilgil is a system programmer experienced in network traffic analysis. He has worked for a nubmer of network security companies making L7 switch appliance.

Yeongsik Moon is a student in the Department of Convergence Security at Kyonggi University and a member of K.knock. Currently He is working on a project about "bypass WIPS defense" at the BOB 4th.

[Abstract] Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, WEP. Wireless(WAP) packets can be dissected if only a hacker is able to figure out EAPoL(Extensible Authentication Protocol over LAN) frames and WPA key. This time, let me show you how wireless packets are dissected into Ethernet frame and how a hacker acquires victim's personal information.

Slides