Show & Tell - DIY Malicious WiFi Hardware |
Abstract
Mike Thompson, CTO of HackHunter, has been researching malicious WiFi and defence systems for the past three years. Mike will bring along his DIY ‘toys’ to show you the different types of hardware tools which can be created to set up malicious WiFi. Malicious WiFi can be used to harvest user credentials, falsify data or stop systems from working altogether, amongst other things, and it’s easy to set up anywhere. Types of malicious WiFi include rogue access points (RAP), man-in-the-middle, remote human interface devices (HID) and denial of service (DOS) attacks. Mike will explain how each tool works so you can build your own and become familiar with their behaviour. If you’re a Blue Teamer, you need to know what tools are out there and understand what they can do so you can protect against them. If you’re a Red Teamer, this presentation will give you some new ideas! Speaker Bio: Mike is an IoT expert with an extensive background in Information and Cyber Security. Among Mike’s many roles, he has worked as a CISO, consulted to over 50 organisations, uncovered computer fraud, legally hacked organisations, designed and developed award-winning software solutions and has provided investigation and advisory services at the highest levels in government across topics as diverse as biometrics and satellite surveillance systems. |