<p> The message that wireless is unsafe has permeated the IT zeitgeist, however people still forget client devices. This talk by Dragorn and Renderman moves away from guarding the access points to guarding the clients. Considering the fun that is continually had by the authors at airports and public networks, this is a message that needs to get out. </p> <p> Attacks targeting client devices are becoming more sophisticated. Kismet Newcore makes breaking WEP a passive action. Airpwn has received a facelift and is now capable of more unspeakable actions over open links (hotels, airports). Karma as well is flypaper for clients running wireless without any thought to protection. Recent vulnerabilities in browsers and other protocols that are often dismissed as “too hard to exploit to be useful” are suddenly very possible and dangerous when wireless is involved, and attacks crossing from layer 2 directly to layer 7 vulnerabilities will be shown. </p>
<p> <strong> Dragorn </strong> is the author of the open-source wireless sniffer and IDS Kismet, as well as several other wireless-related open source projects such as spectrum analysis tools and drivers, LORCON packet injection, and others. </p>
<p> <strong> RenderMan </strong> is a Canadian born and raised hacker who spends way too much time figuring out ways of inserting electronics into treasured childhood toys. A frequent speaker at hacker and security cons around the world, he has also been an author on three books: <em> RFID Security, </em> <em> Kismet Hacking, </em> and <em> Seven Deadliest Wireless Technology Attacks, </em> all from Syngress. Consultant by trade, hacker by birth, black hat by fashion, co-refounder of the Church of Wifi, and recent member of the NMRC, he spends his time adding to his expansive collection of con badges and thinking of new ways to subvert wireless networks and childhood memories. </p>