Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

802.1x and Beyond

Black Hat via YouTube

Overview

Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
This course aims to help researchers expose vulnerabilities within systems implementing IEEE 802.1x authentication protocol. The learning outcomes include dissecting IEEE 802.1x and its surrounding protocols, providing testing tools, and detailing vulnerabilities in supporting systems. The course teaches skills such as decapsulation, attacking RADIUS servers, using tools like Free Radius and Hostapd, and understanding attack surfaces. The teaching method involves a talk format with a demonstration of a vulnerability allowing remote code execution over 802.11 wireless. The intended audience for this course is researchers interested in network security and authentication protocols.

Syllabus

Intro
Who is Brad
Agenda
What is 802
Playing around with 802
EEP
Decapsulation
Radius
Attack Surfaces
Known Attacks
Free Radius WPE
Hostapd
No Exploits
Peach Fuzzer
How it works
RFCs
Other publishers
Free stuff
Tools
Profile
Enumeration
WP supplicant
Notes for researchers
Redirect program flow
Exploit

Taught by

Black Hat

Reviews

Start your review of 802.1x and Beyond

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.