Andrés Blanco

Argentina
740 seguidores Más de 500 os

Unirse para ver el perfil

Acerca de

I am ionate about information security. With more than 19 years of experience. On my…

Actividad

Unirse para ver toda la actividad

Experiencia y educación

  • Fingerprint

Mira la experiencia completa de Andrés

Mira su cargo, antigüedad y más

o

Al hacer clic en «Continuar» para unirte o iniciar sesión, aceptas las Condiciones de uso, la Política de privacidad y la Política de cookies de LinkedIn.

Publicaciones

  • WIG: Wi-Fi Information Gathering

    Black Hat USA - Arsenal

    WIG (Wi-Fi Information Gathering) is a free and open source (GPLv3) utility for IEEE 802.11 device fingerprinting. WIG uses Wi-Fi network interfaces that s monitor mode to obtain information on nearby devices with Wi-Fi . The tool s vendors proprietary protocols such as Apple AirDrop/AirPlay, Cisco Client eXtensions, Wi-Fi Protected Setup (WPS) and Wi-Fi Direct. Using these protocols the tool is able to find and fingerprint potential Wi-Fi targets that other tools are not…

    WIG (Wi-Fi Information Gathering) is a free and open source (GPLv3) utility for IEEE 802.11 device fingerprinting. WIG uses Wi-Fi network interfaces that s monitor mode to obtain information on nearby devices with Wi-Fi . The tool s vendors proprietary protocols such as Apple AirDrop/AirPlay, Cisco Client eXtensions, Wi-Fi Protected Setup (WPS) and Wi-Fi Direct. Using these protocols the tool is able to find and fingerprint potential Wi-Fi targets that other tools are not able to find. The tool output it's useful on the threat modeling phase during wi-fi penetration testing or to find potential targets during a network assessment.

    Ver publicación
  • Wi-Fi Direct to Hell: Attacking Wi-Fi Direct Protocol Implementations

    Black Hat Europe 2017

    Today Wi-Fi is everywhere and is by far the most widely used wireless networking protocol. During the last years, Wi-Fi security research was mainly focused on WPA/WPA2 security mechanisms. But modern Wi-Fi firmware's and drivers several protocols that could be targeted by attackers. This is the case of Wi-Fi P2P, also known as Wi-Fi Direct. This protocol provides with the ability to discover nearby devices and connect directly to each other via Wi-Fi without an intermediate access…

    Today Wi-Fi is everywhere and is by far the most widely used wireless networking protocol. During the last years, Wi-Fi security research was mainly focused on WPA/WPA2 security mechanisms. But modern Wi-Fi firmware's and drivers several protocols that could be targeted by attackers. This is the case of Wi-Fi P2P, also known as Wi-Fi Direct. This protocol provides with the ability to discover nearby devices and connect directly to each other via Wi-Fi without an intermediate access point.

    This talk will present an in-depth security analysis of Wi-Fi Direct protocol including an architectural overview, description of the discovery process, description of the connection process and a description of the frame formats. Additionally, we will use Android, HP Printers, and Samsung Smart TVs among others as an example of vulnerable implementations. At the end of the presentation, we will release PoC for the vulnerabilities and a tool for fingerprinting devices ing Wi-Fi Direct protocol.

    Ver publicación
  • 802.11 Protocol Chaos

    Ekoparty

    Over the last few years, IEEE 802.11 standard for wireless connectivity usage has turned massive. Wireless devices are everywhere, from your smartphone to the printer that is in your office. IEEE 802.11 standard has many versions and 3rd party extensions bringing new features that add complexity to the protocol. Modern devices several specifications such as Cisco Client Extensions, WiFi Protected Setup, WiFi Direct, AirPlay and AirDrop (just to mention a couple of them). This complexity…

    Over the last few years, IEEE 802.11 standard for wireless connectivity usage has turned massive. Wireless devices are everywhere, from your smartphone to the printer that is in your office. IEEE 802.11 standard has many versions and 3rd party extensions bringing new features that add complexity to the protocol. Modern devices several specifications such as Cisco Client Extensions, WiFi Protected Setup, WiFi Direct, AirPlay and AirDrop (just to mention a couple of them). This complexity makes platform implementations more intricate, opening opportunities for attackers. This presentation will show how attackers could use these specifications to fingerprint devices, abuse of bad implementations to access devices and get internal network information without even connecting to the network.

    Ver publicación
  • 802.11 Protocol Chaos

    Infiltrate

    Over the last few years, IEEE 802.11 standard for wireless connectivity usage has turned massive. Wireless devices are everywhere, from your smartphone to the printer that is in your office.

    IEEE 802.11 standard has many versions and 3rd party extensions bringing new features that add complexity to the protocol. Modern devices several specifications such as Cisco Client Extensions, WiFi Protected Setup, WiFi Direct, AirPlay and AirDrop (just to mention a couple of them). This…

    Over the last few years, IEEE 802.11 standard for wireless connectivity usage has turned massive. Wireless devices are everywhere, from your smartphone to the printer that is in your office.

    IEEE 802.11 standard has many versions and 3rd party extensions bringing new features that add complexity to the protocol. Modern devices several specifications such as Cisco Client Extensions, WiFi Protected Setup, WiFi Direct, AirPlay and AirDrop (just to mention a couple of them). This complexity makes platform implementations more intricate, opening opportunities for attackers.

    This presentation will show how attackers could use these specifications to fingerprint devices, abuse of bad implementations to access devices and get internal network information without even connecting to the network.

    Ver publicación
  • 802.11 Complexity

    DeepSec 2016

    Over the last few years, IEEE 802.11 standard for wireless connectivity usage has turned massive. Wireless devices are everywhere, from your smartphone to the printer that is in your office. As a matter of fact, all connected devices have proliferated at an incredible rate.

    IEEE 802.11 standard has many versions and 3rd party extensions bringing new features that add complexity to the protocol. This complexity makes platform implementations and drivers more intricate, opening…

    Over the last few years, IEEE 802.11 standard for wireless connectivity usage has turned massive. Wireless devices are everywhere, from your smartphone to the printer that is in your office. As a matter of fact, all connected devices have proliferated at an incredible rate.

    IEEE 802.11 standard has many versions and 3rd party extensions bringing new features that add complexity to the protocol. This complexity makes platform implementations and drivers more intricate, opening opportunities for attackers.

    This presentation will show how attackers could use these features to fingerprint devices, abuse bad implementations to access devices with no credentials and how researchers could analyze 802.11 implementations on platforms such as Android and iOS for bug hunting.

    Ver publicación
  • 802.11 Massive Monitoring

    DEF CON 23

    Wireless traffic analysis has been commonplace for quite a while now, frequently used in penetration testing and various areas of research. But what happens when channel hopping just doesn't cut it anymore -- can we monitor all 802.11 channels?

    In this presentation we describe the analysis, different approaches and the development of a system to monitor and inject frames using routers running OpenWRT as wireless workers. At the end of this presentation we will release the tool we used to…

    Wireless traffic analysis has been commonplace for quite a while now, frequently used in penetration testing and various areas of research. But what happens when channel hopping just doesn't cut it anymore -- can we monitor all 802.11 channels?

    In this presentation we describe the analysis, different approaches and the development of a system to monitor and inject frames using routers running OpenWRT as wireless workers. At the end of this presentation we will release the tool we used to solve this problem.

    Otros autores
    Ver publicación
  • Impacket

    Black Hat USA - Arsenal

    Impacket is a collection of Python classes focused on providing access to network packets. Impacket allows Python developers to craft and decode network packets in simple and consistent manner. It includes for low-level protocols such as IP, UDP and T, as well as higher-level protocols such as NMB, SMB and MSRPC and DCOM. Impacket is highly effective when used in conjunction with a packet capture utility or package such as Pcapy. Packets can be constructed from scratch, as well as…

    Impacket is a collection of Python classes focused on providing access to network packets. Impacket allows Python developers to craft and decode network packets in simple and consistent manner. It includes for low-level protocols such as IP, UDP and T, as well as higher-level protocols such as NMB, SMB and MSRPC and DCOM. Impacket is highly effective when used in conjunction with a packet capture utility or package such as Pcapy. Packets can be constructed from scratch, as well as parsed from raw data. Furthermore, the object oriented API makes it simple to work with deep protocol hierarchies.

    Otros autores
    Ver publicación
  • One firmware to monitor 'em all

    Hack.lu security conference

    This paper describes the process of reverse engineering and modification of wireless cards on a wide variety of cell phones and tablets. Its implications, related work and how to set these cards on monitor mode.

    Otros autores
    Ver publicación
  • One Firmware to Monitor 'em All

    Ekoparty 2012

    In recent years, mobile devices have become articles of use masivo.Por Usually these devices follow the IEEE 802.11 standard for wireless connectivity. Broadcom is one of the semi-conductor companies leading in the area of wireless communication and broadband. Some of its WiFi solutions (chipsets BCM4325 & BCM4329) are included in a large part of the mobile devices market in products such as Apple, Samsung, Motorola, Sony, Nokia, LG, Asus and HTC. In this paper we describe the process of…

    In recent years, mobile devices have become articles of use masivo.Por Usually these devices follow the IEEE 802.11 standard for wireless connectivity. Broadcom is one of the semi-conductor companies leading in the area of wireless communication and broadband. Some of its WiFi solutions (chipsets BCM4325 & BCM4329) are included in a large part of the mobile devices market in products such as Apple, Samsung, Motorola, Sony, Nokia, LG, Asus and HTC. In this paper we describe the process of modifying the firmware of these plates. The results presented could open new possibilities in the field of computer security, such as direct access to the baseband components without the intervention of the operating system, and the ability to store information in the internal memory of the plates, among others. During the talk, we will cross the internals of the firmware, and our reverse engineering process, and we will show how to put these plates in monitor mode, as proof of concept.

    Otros autores
    Ver publicación
  • Abusing the Windows WiFi native API to create a Covert Channel

    Hack.lu security conference

    Communications over wireless channels have been perfectioned in the last years mainly improving performance and speed features. Security in this field has been a concern since the first 802.11 draft, having evolved by adding security features based on different crypto systems. In this paper we focus on the construction of a covert channel, exploitable in any system, between any endpoint and a specially crafted endpoint. The channel built can be started even while an active connection is…

    Communications over wireless channels have been perfectioned in the last years mainly improving performance and speed features. Security in this field has been a concern since the first 802.11 draft, having evolved by adding security features based on different crypto systems. In this paper we focus on the construction of a covert channel, exploitable in any system, between any endpoint and a specially crafted endpoint. The channel built can be started even while an active connection is established between a computer and a wireless Access Point, with one unique network device. This functionality allows an attacker that compromised a wireless enabled endpoint to extract available information and avoid detection. We will describe the design behind the channel structure and a fully functional implementation.

    Otros autores
    Ver publicación
Únete para ver todas las publicaciones

Proyectos

  • wig-ng

    WIG (WiFi Information Gathering) is a free and open source utility for WiFi device fingerprinting.

    Ver proyecto
  • Native WiFi API Beacon Sniffer

    Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.

    Ver proyecto
  • chopping

    -

    Linux 802.11 channel hopping utility.

    Ver proyecto
  • Search Immediate (BinaryNinja Plugin)

    -

    Plugin for BinaryNinja that provides different search capabilities.

    Ver proyecto
  • WiWo

    -

    WiWo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) can be managed by a Python framework.

    Otros creadores
    Ver proyecto
  • PyWiWi

    -

    PyWiWi is a set of Python bindings for the Windows Native Wifi API.

    Ver proyecto
  • MonMob

    -

    This is a set of tools to provide monitor mode and raw frame injection for devices using broadcom chipsets bcm4325, bcm4329 and bcm4330.

    Ver proyecto
  • pylorcon2

    -

    PyLorcon2 is a Python wrapper for the Lorcon2 library.

    Lorcon2 (Loss Of Radio CONnectivity) is a generic library for injecting 802.11 frames, capable of injection via multiple driver frameworks, without forcing modification of the application code for each platform/driver.

    Otros creadores
    Ver proyecto
  • wwtool

    -

    wwwtool is a wireless scanning command line tool for Windows, that uses the Windows Native WiFi API to list available networks.

  • WPSIG

    -

    It's a simple tool (written in Python) that does information gathering using WPS information elements. WPS or Wi-Fi Protected Setup is a standard created by the Wi-Fi Alliance that allows the s to setup the security of a Wireless AP in a simple way.

Idiomas

  • Spanish

    Competencia bilingüe o nativa

  • English

    Competencia básica profesional

Más actividad de Andrés

Ver el perfil completo de Andrés

  • Descubrir a quién conocéis en común
  • Conseguir una presentación
  • ar con Andrés directamente
Unirse para ver el perfil completo

Perfiles similares

Otras personas con el nombre de Andrés Blanco en Argentina

Añade nuevas aptitudes con estos cursos