Presentation Title Attacking Cisco Enterprise WLAN Solutions
Presentation Abstract
The world of “Enterprise WLAN solutions” is full of obscure and “non-standard” elements and technologies. Cisco’s solutions are no exception here.
In this talk we will describe potential and practical attacks against components, network traffic and/or cryptographic material in different generations of their “Enterprise WLAN offerings”. This includes pretty standard attacks against management interfaces as well as some not-so-common insight how one of their proprietary protocols works (or fails, security-wise). As usual, a number of demos will add spice and some code will be released.
About Daniel Mende
Daniel Mende is a German security researcher specialized on networkprotocols and technologies. He’s well known for his Layer2 extensions of the SPIKE and Sulley fuzzing frameworks, he has discussed new ways in botnet-building and presented on protocol security at many occasions including Troopers08, ShmooCon and Blackhat. Usually he releases a new tool when giving a talk.
** Note: Presenting with Oliver Roeschke (ERNW GmbH)