Resources Webinar

Wi-Fi Vulnerabilities

Part 2

Bastille’s Vulnerability Series educates security professionals on the ever-evolving risks and vulnerabilities present within wireless protocols. This installment in the Vulnerability Series focuses on Part 2 of our earlier discussion of Wi-Fi Vulnerabilities.

In this webinar, our CTO, Brett Walkenhorst, PhD, discusses a range of topics related to Wi-Fi Vulnerabilities such as:

Authentication Cracking – WEP, WPS PIN, PMKID, 4-way Handshake, Password Spraying

Client Attacks – PitM, Captive Portal, NetNTLM hash stealing, etc.

Hacker Devices – Wi-Fi Pineapple, O.MG Cable, Wi-Fi USB Rubber Ducky, etc.

This threat of Wi-Fi Vulnerabilities often remains unseen by physical security due to the wireless nature of RF. However, Wi-Fi Vulnerabilities exploited by a malicious actor can compromise your organization’s security, thus necessitating the need for increased awareness and preparedness surrounding the range of current Wi-Fi Vulnerabilities.

In the webinar Dr. Walkenhorst details the current landscape of Wi-Fi Vulnerabilities, and provides techniques on how to mitigate this threat, including:

Monitoring for Suspicious Devices

Policies and Training for Employees

Best Practices for your Wi-Fi networks and devices

Speaker:

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

We’d love to show you around

Learn how Bastille can help you prepare you for today’s ever-growing wireless threat landscape, and schedule a demo and we’ll be in touch shortly.