T7 “802.1X and Beyond!” presented at RochesterSecuritySummit 2015

by Brad Antoniewicz,

Summary : IEEE 802.1X has long been leveraged for authentication purposes. Up until this point, little has been done to help researchers expose vulnerabilities within the systems that implement the protocol. In this talk, we’ll dissect IEEE 802.1X and its surrounding protocols (RADIUS/EAP), provide testing tools, and detail a number of vulnerabilities identified in popular supporting systems. We’ll wrap up by demonstrating a vulnerability within a RADIUS server that allows for remote code execution over 802.11 wireless using WPA Enterprise before the user is authorized to join the network.