"the top left the channel is constantly changing. it ’ s scanning through different channels and looking for different aps and stuff like that. so you can see right there we got wep network environmental storytelling. ben bowman do you guys think that might be the network that we …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1588.002Tool
84%
"the same ride together ever since. so one of the things before we start, i want to talk about is john talked about why he was excited. i want to share why i ’ m excited. i started hacking when i was 12. and the way i got into it was i got a shopco cell phone. if you guys remember…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1557.001Name Resolution Poisoning and SMB Relay
70%
"and it shows you how to use that tool and crack it. wps, pixie dust attack. that ’ s a type of authentication that lets you log on faster with a button. and we just use a tool called wi fi to and it just runs an attack in it and shows you what the pin is airged in dos, which is a…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.002Spearphishing Link
61%
"? jojo. joseph boyd wi - fi fisher lets you phish people. so what we ’ re going to do with this is we are going to use, wi - fi fisher to set up a fake wi fi sign in page. so we ’ re going to launch a browser and it ’ s going to take you. if you go to that ip or that link that yo…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1040Network Sniffing
45%
"basically, what ’ s happening under the hood with wep is. the big problem with wep isn ’ t necessarily the fact that it ’ s using des. it ’ s the problem. well, it ’ s a stream cipher. it ’ s using des. and one of the problems with using des with the stream cipher is if you look …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1557.001Name Resolution Poisoning and SMB Relay
43%
"attack, i remember this lab correctly, is. yeah. w. the wpa2. ben bowman yep. so, if you guys don ’ t know every wireless signal has a channel and you don ’ t need to understand why, i just understand that it does. right. so 611 and one of the most common used channels, except fo…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
In this video, John Strand and his team discuss the challenges of setting up and running wireless labs, particularly focusing on the issues faced during Wild West Hackin’ Fest events. They highlight the development of an open-source project aimed at virtualizing wireless labs, which allows learners to practice wireless hacking techniques without needing physical hardware.