DATE: Nov. 9, 2011 | LOCATION: Tysons Corner, VA
Wireless technology is exploding in popularity. Businesses are not only migrating to wireless networking, they are steadily integrating wireless technology into their wired infrastructure. This explosion has given momentum to a new generation of hackers who specialize in inventing and deploying innovative methods of hijacking wireless communications.
Hackers armed with tools such as file2net, MDK3, Aircrack-ng, Karma, Karmetasploit, Jasager, JasagerPwn, Satanic AP, Scapy, sslstrip, Sidejacking, Firesheep, Interceptor are launching attacks on networks that a year ago were said to be unbreakable. Adding to the confusion is the increase in rogue wireless devices including stealth rogues, soft APs, wireless-enabled laptops and smart-phones, and neighboring wireless networks that bleed over combining hostile rogues with friendly or unconnected networks.
Attend this complimentary live seminar hosted by Motorola AirDefense Solutions featuring experts from the National Security Agency (NSA) where they demonstrate today’s current wireless hacking tools and techniques and best practices that organizations can adopt to secure wireless networks.
|NSA’s View of Wireless Security Risks
Michael Stone, Chief – Applied Mitigations, Information Assurance Directorate (IAD), National Security Agency (NSA)
|•||Overview of secure WLAN initiatives|
|•||Vulnerabilities/risks addressed by various security components|
|Next-Generation Wireless LAN Risks & Defenses
Kent Woodruff, Chief Security Analyst, Motorola AirDefense
|•||Evolving wireless LAN threats & attack sophistication|
|•||Common WLAN attacks demonstrated – PSK cracking, Stealthy Rogues, JasagerPwn (with Metasploit, fakeupdate and sslstrip), Sidejacking, FakeAP with Airbase-ng and mdk3, Scapy|
|•||Best practices for wireless LAN security & compliance|