Acerca de
Actividad
-
Headed to Money20/20 in Amsterdam? Stop by booth 5J270 from June 3–5 to see how leading fraud and security teams are using device intelligence to:…
Headed to Money20/20 in Amsterdam? Stop by booth 5J270 from June 3–5 to see how leading fraud and security teams are using device intelligence to:…
Recomendado por Andrés Blanco
-
𝗦𝗔𝗣 𝗚𝗮𝘁𝗲𝘄𝗮𝘆, 𝗦𝗔𝗣 𝗜𝗖𝗠, 𝗦𝗔𝗣 𝗠𝗲𝘀𝘀𝗮𝗴𝗲 𝗦𝗲𝗿𝘃𝗲𝗿, 𝗮𝗻𝗱 𝗦𝗔𝗣 𝗝𝟮𝗘𝗘 𝗛𝗧𝗧𝗣 𝗮𝗹𝗹 𝗮𝗰𝗰𝗲𝗽𝘁 𝗲𝘅𝘁𝗲𝗿𝗻𝗮𝗹…
𝗦𝗔𝗣 𝗚𝗮𝘁𝗲𝘄𝗮𝘆, 𝗦𝗔𝗣 𝗜𝗖𝗠, 𝗦𝗔𝗣 𝗠𝗲𝘀𝘀𝗮𝗴𝗲 𝗦𝗲𝗿𝘃𝗲𝗿, 𝗮𝗻𝗱 𝗦𝗔𝗣 𝗝𝟮𝗘𝗘 𝗛𝗧𝗧𝗣 𝗮𝗹𝗹 𝗮𝗰𝗰𝗲𝗽𝘁 𝗲𝘅𝘁𝗲𝗿𝗻𝗮𝗹…
Recomendado por Andrés Blanco
Experiencia y educación
Publicaciones
-
WIG: Wi-Fi Information Gathering
Black Hat USA - Arsenal
WIG (Wi-Fi Information Gathering) is a free and open source (GPLv3) utility for IEEE 802.11 device fingerprinting. WIG uses Wi-Fi network interfaces that s monitor mode to obtain information on nearby devices with Wi-Fi . The tool s vendors proprietary protocols such as Apple AirDrop/AirPlay, Cisco Client eXtensions, Wi-Fi Protected Setup (WPS) and Wi-Fi Direct. Using these protocols the tool is able to find and fingerprint potential Wi-Fi targets that other tools are not…
WIG (Wi-Fi Information Gathering) is a free and open source (GPLv3) utility for IEEE 802.11 device fingerprinting. WIG uses Wi-Fi network interfaces that s monitor mode to obtain information on nearby devices with Wi-Fi . The tool s vendors proprietary protocols such as Apple AirDrop/AirPlay, Cisco Client eXtensions, Wi-Fi Protected Setup (WPS) and Wi-Fi Direct. Using these protocols the tool is able to find and fingerprint potential Wi-Fi targets that other tools are not able to find. The tool output it's useful on the threat modeling phase during wi-fi penetration testing or to find potential targets during a network assessment.
-
Wi-Fi Direct to Hell: Attacking Wi-Fi Direct Protocol Implementations
Black Hat Europe 2017
Today Wi-Fi is everywhere and is by far the most widely used wireless networking protocol. During the last years, Wi-Fi security research was mainly focused on WPA/WPA2 security mechanisms. But modern Wi-Fi firmware's and drivers several protocols that could be targeted by attackers. This is the case of Wi-Fi P2P, also known as Wi-Fi Direct. This protocol provides with the ability to discover nearby devices and connect directly to each other via Wi-Fi without an intermediate access…
Today Wi-Fi is everywhere and is by far the most widely used wireless networking protocol. During the last years, Wi-Fi security research was mainly focused on WPA/WPA2 security mechanisms. But modern Wi-Fi firmware's and drivers several protocols that could be targeted by attackers. This is the case of Wi-Fi P2P, also known as Wi-Fi Direct. This protocol provides with the ability to discover nearby devices and connect directly to each other via Wi-Fi without an intermediate access point.
This talk will present an in-depth security analysis of Wi-Fi Direct protocol including an architectural overview, description of the discovery process, description of the connection process and a description of the frame formats. Additionally, we will use Android, HP Printers, and Samsung Smart TVs among others as an example of vulnerable implementations. At the end of the presentation, we will release PoC for the vulnerabilities and a tool for fingerprinting devices ing Wi-Fi Direct protocol. -
802.11 Protocol Chaos
Ekoparty
Over the last few years, IEEE 802.11 standard for wireless connectivity usage has turned massive. Wireless devices are everywhere, from your smartphone to the printer that is in your office. IEEE 802.11 standard has many versions and 3rd party extensions bringing new features that add complexity to the protocol. Modern devices several specifications such as Cisco Client Extensions, WiFi Protected Setup, WiFi Direct, AirPlay and AirDrop (just to mention a couple of them). This complexity…
Over the last few years, IEEE 802.11 standard for wireless connectivity usage has turned massive. Wireless devices are everywhere, from your smartphone to the printer that is in your office. IEEE 802.11 standard has many versions and 3rd party extensions bringing new features that add complexity to the protocol. Modern devices several specifications such as Cisco Client Extensions, WiFi Protected Setup, WiFi Direct, AirPlay and AirDrop (just to mention a couple of them). This complexity makes platform implementations more intricate, opening opportunities for attackers. This presentation will show how attackers could use these specifications to fingerprint devices, abuse of bad implementations to access devices and get internal network information without even connecting to the network.
-
802.11 Protocol Chaos
Infiltrate
Over the last few years, IEEE 802.11 standard for wireless connectivity usage has turned massive. Wireless devices are everywhere, from your smartphone to the printer that is in your office.
IEEE 802.11 standard has many versions and 3rd party extensions bringing new features that add complexity to the protocol. Modern devices several specifications such as Cisco Client Extensions, WiFi Protected Setup, WiFi Direct, AirPlay and AirDrop (just to mention a couple of them). This…Over the last few years, IEEE 802.11 standard for wireless connectivity usage has turned massive. Wireless devices are everywhere, from your smartphone to the printer that is in your office.
IEEE 802.11 standard has many versions and 3rd party extensions bringing new features that add complexity to the protocol. Modern devices several specifications such as Cisco Client Extensions, WiFi Protected Setup, WiFi Direct, AirPlay and AirDrop (just to mention a couple of them). This complexity makes platform implementations more intricate, opening opportunities for attackers.
This presentation will show how attackers could use these specifications to fingerprint devices, abuse of bad implementations to access devices and get internal network information without even connecting to the network. -
802.11 Complexity
DeepSec 2016
Over the last few years, IEEE 802.11 standard for wireless connectivity usage has turned massive. Wireless devices are everywhere, from your smartphone to the printer that is in your office. As a matter of fact, all connected devices have proliferated at an incredible rate.
IEEE 802.11 standard has many versions and 3rd party extensions bringing new features that add complexity to the protocol. This complexity makes platform implementations and drivers more intricate, opening…Over the last few years, IEEE 802.11 standard for wireless connectivity usage has turned massive. Wireless devices are everywhere, from your smartphone to the printer that is in your office. As a matter of fact, all connected devices have proliferated at an incredible rate.
IEEE 802.11 standard has many versions and 3rd party extensions bringing new features that add complexity to the protocol. This complexity makes platform implementations and drivers more intricate, opening opportunities for attackers.
This presentation will show how attackers could use these features to fingerprint devices, abuse bad implementations to access devices with no credentials and how researchers could analyze 802.11 implementations on platforms such as Android and iOS for bug hunting. -
802.11 Massive Monitoring
DEF CON 23
Wireless traffic analysis has been commonplace for quite a while now, frequently used in penetration testing and various areas of research. But what happens when channel hopping just doesn't cut it anymore -- can we monitor all 802.11 channels?
In this presentation we describe the analysis, different approaches and the development of a system to monitor and inject frames using routers running OpenWRT as wireless workers. At the end of this presentation we will release the tool we used to…Wireless traffic analysis has been commonplace for quite a while now, frequently used in penetration testing and various areas of research. But what happens when channel hopping just doesn't cut it anymore -- can we monitor all 802.11 channels?
In this presentation we describe the analysis, different approaches and the development of a system to monitor and inject frames using routers running OpenWRT as wireless workers. At the end of this presentation we will release the tool we used to solve this problem.Otros autoresVer publicación -
Impacket
Black Hat USA - Arsenal
Impacket is a collection of Python classes focused on providing access to network packets. Impacket allows Python developers to craft and decode network packets in simple and consistent manner. It includes for low-level protocols such as IP, UDP and T, as well as higher-level protocols such as NMB, SMB and MSRPC and DCOM. Impacket is highly effective when used in conjunction with a packet capture utility or package such as Pcapy. Packets can be constructed from scratch, as well as…
Impacket is a collection of Python classes focused on providing access to network packets. Impacket allows Python developers to craft and decode network packets in simple and consistent manner. It includes for low-level protocols such as IP, UDP and T, as well as higher-level protocols such as NMB, SMB and MSRPC and DCOM. Impacket is highly effective when used in conjunction with a packet capture utility or package such as Pcapy. Packets can be constructed from scratch, as well as parsed from raw data. Furthermore, the object oriented API makes it simple to work with deep protocol hierarchies.
Otros autoresVer publicación -
One firmware to monitor 'em all
Hack.lu security conference
This paper describes the process of reverse engineering and modification of wireless cards on a wide variety of cell phones and tablets. Its implications, related work and how to set these cards on monitor mode.
Otros autoresVer publicación -
One Firmware to Monitor 'em All
Ekoparty 2012
In recent years, mobile devices have become articles of use masivo.Por Usually these devices follow the IEEE 802.11 standard for wireless connectivity. Broadcom is one of the semi-conductor companies leading in the area of wireless communication and broadband. Some of its WiFi solutions (chipsets BCM4325 & BCM4329) are included in a large part of the mobile devices market in products such as Apple, Samsung, Motorola, Sony, Nokia, LG, Asus and HTC. In this paper we describe the process of…
In recent years, mobile devices have become articles of use masivo.Por Usually these devices follow the IEEE 802.11 standard for wireless connectivity. Broadcom is one of the semi-conductor companies leading in the area of wireless communication and broadband. Some of its WiFi solutions (chipsets BCM4325 & BCM4329) are included in a large part of the mobile devices market in products such as Apple, Samsung, Motorola, Sony, Nokia, LG, Asus and HTC. In this paper we describe the process of modifying the firmware of these plates. The results presented could open new possibilities in the field of computer security, such as direct access to the baseband components without the intervention of the operating system, and the ability to store information in the internal memory of the plates, among others. During the talk, we will cross the internals of the firmware, and our reverse engineering process, and we will show how to put these plates in monitor mode, as proof of concept.
Otros autoresVer publicación -
Abusing the Windows WiFi native API to create a Covert Channel
Hack.lu security conference
Communications over wireless channels have been perfectioned in the last years mainly improving performance and speed features. Security in this field has been a concern since the first 802.11 draft, having evolved by adding security features based on different crypto systems. In this paper we focus on the construction of a covert channel, exploitable in any system, between any endpoint and a specially crafted endpoint. The channel built can be started even while an active connection is…
Communications over wireless channels have been perfectioned in the last years mainly improving performance and speed features. Security in this field has been a concern since the first 802.11 draft, having evolved by adding security features based on different crypto systems. In this paper we focus on the construction of a covert channel, exploitable in any system, between any endpoint and a specially crafted endpoint. The channel built can be started even while an active connection is established between a computer and a wireless Access Point, with one unique network device. This functionality allows an attacker that compromised a wireless enabled endpoint to extract available information and avoid detection. We will describe the design behind the channel structure and a fully functional implementation.
Otros autoresVer publicación
Proyectos
-
wig-ng
WIG (WiFi Information Gathering) is a free and open source utility for WiFi device fingerprinting.
-
Native WiFi API Beacon Sniffer
Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.
-
Search Immediate (BinaryNinja Plugin)
-
Plugin for BinaryNinja that provides different search capabilities.
-
WiWo
-
WiWo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) can be managed by a Python framework.
Otros creadoresVer proyecto -
MonMob
-
This is a set of tools to provide monitor mode and raw frame injection for devices using broadcom chipsets bcm4325, bcm4329 and bcm4330.
-
pylorcon2
-
PyLorcon2 is a Python wrapper for the Lorcon2 library.
Lorcon2 (Loss Of Radio CONnectivity) is a generic library for injecting 802.11 frames, capable of injection via multiple driver frameworks, without forcing modification of the application code for each platform/driver.Otros creadoresVer proyecto -
wwtool
-
wwwtool is a wireless scanning command line tool for Windows, that uses the Windows Native WiFi API to list available networks.
-
WPSIG
-
It's a simple tool (written in Python) that does information gathering using WPS information elements. WPS or Wi-Fi Protected Setup is a standard created by the Wi-Fi Alliance that allows the s to setup the security of a Wireless AP in a simple way.
Idiomas
-
Spanish
Competencia bilingüe o nativa
-
English
Competencia básica profesional
Más actividad de Andrés
-
I'm thrilled to announce "HTTP/1 Must Die! The Desync Endgame", at BlackHat USA! This is going to be epic, check out the abstract for a teaser ↓↓↓…
I'm thrilled to announce "HTTP/1 Must Die! The Desync Endgame", at BlackHat USA! This is going to be epic, check out the abstract for a teaser ↓↓↓…
Recomendado por Andrés Blanco
-
Thanks everyone for coming to the inaugural OpenAI Security Research Conference! The conversations were great and I really enjoyed seeing the…
Thanks everyone for coming to the inaugural OpenAI Security Research Conference! The conversations were great and I really enjoyed seeing the…
Recomendado por Andrés Blanco
-
Wrapping another week with a handful of highlights from the intersection of cybersecurity, AI, and general nerdery. I continue to be amazed at the…
Wrapping another week with a handful of highlights from the intersection of cybersecurity, AI, and general nerdery. I continue to be amazed at the…
Recomendado por Andrés Blanco
-
Fraudsters move fast. Now you can move faster. Introducing Velocity Signals, the latest Fingerprint’s fraud detection engine. It surfaces…
Fraudsters move fast. Now you can move faster. Introducing Velocity Signals, the latest Fingerprint’s fraud detection engine. It surfaces…
Recomendado por Andrés Blanco
-
Hey Linkedin Network! We are hiring! Come us to redefine offensive security through AI! Check our opening and hope to see you soon on slack…
Hey Linkedin Network! We are hiring! Come us to redefine offensive security through AI! Check our opening and hope to see you soon on slack…
Recomendado por Andrés Blanco
-
Don't miss out on our surprise Easter Quest! It's a mix of Hacker Movies and light technical challenges; won't be too hard to solve and a 6-month…
Don't miss out on our surprise Easter Quest! It's a mix of Hacker Movies and light technical challenges; won't be too hard to solve and a 6-month…
Recomendado por Andrés Blanco
-
Thank you YesWeHack for this interview and the amazing live hacking event you hosted in Buenos Aires!
Thank you YesWeHack for this interview and the amazing live hacking event you hosted in Buenos Aires!
Recomendado por Andrés Blanco
-
Thrilled to share that my discovery of an important security flaw in the Octulus Meta VR device last year uncovered while auditing its Android code…
Thrilled to share that my discovery of an important security flaw in the Octulus Meta VR device last year uncovered while auditing its Android code…
Recomendado por Andrés Blanco
-
We are looking for an IT & Corporate Security lead to work at XBOW! At XBOW, we are building the world's first autonomous pentester, powered by AI.…
We are looking for an IT & Corporate Security lead to work at XBOW! At XBOW, we are building the world's first autonomous pentester, powered by AI.…
Recomendado por Andrés Blanco
-
Thank you George Kurtz for this confident welcome back to my family and home! I am excited and humbled to be part of the mission once again, and…
Thank you George Kurtz for this confident welcome back to my family and home! I am excited and humbled to be part of the mission once again, and…
Recomendado por Andrés Blanco
-
We wrapped up two intensive days of training on Advanced Malware Traffic Analysis at Black Hat Asia Singapore with Sebastián García ! Thanks to…
We wrapped up two intensive days of training on Advanced Malware Traffic Analysis at Black Hat Asia Singapore with Sebastián García ! Thanks to…
Recomendado por Andrés Blanco
-
As I shared in my last post, businesses would get better ROI from detecting and blocking bots rather than focusing on agents. But that doesn’t mean…
As I shared in my last post, businesses would get better ROI from detecting and blocking bots rather than focusing on agents. But that doesn’t mean…
Recomendado por Andrés Blanco
Perfiles similares
Otras personas con el nombre de Andrés Blanco en Argentina
-
Andrés Blanco
Developer
-
Andres Blanco
Desarrollador Fullstack Ssr especializado en sistemas de gestión
-
Andrés Blanco
--
-
Andrés Blanco
Presidente en ABS Group
Hay 136 personas más con el nombre de Andrés Blanco en Argentina en LinkedIn
Ver a otras personas con el nombre de Andrés Blanco