Presented at 
BSidesLV 2015,
          Aug. 4, 2015, 5:30 p.m.
          (25 minutes).
          
          
          
          
This presentation discusses a strategy for reverse-engineering router firmware to analyze algorithms used to generate default WPA2 PSKs, and demonstrates how such passwords can be recovered within minutes. Further, we describe a procedure that can instantly gather a complete wireless authentication trace, which enables an off-line password recovery attack.
          
          Presenters:
          
            
            - 
              Eduardo Novella
               - Student at Radboud Nijmegen - Security Analyst at Riscure
              
              
Eduardo is a Security Analyst who specializes in embedded device security. He is known for messing around with wireless routers, and has published research on EMV-CAP and WirelessHART during his studies. He holds a BS in CS from Universitat Politécnica de Valencia (Spain), and a Masters in Computer Security from The Kerckhoffs Institute at  Radboud University Nijmegen (The Netherlands).
             
            
          
          
          
          Links:
          
          
          
          
          Similar Presentations: