When the Nearest Neighbor becomes the Nearest Adversary



Discover the covert world of wireless network exploitation in our webcast on the "Nearest Neighbor Attack," as recently detailed by Volexity. This attack leverages nearby Wi-Fi networks for covert access, weaponizing proximity in an innovative and stealthy way. Join us as we explore how these techniques have long been a part of advanced wireless exploitation. As instructors and authors for the SANS SEC617: Wireless Penetration Testing and Ethical Hacking, we have been teaching and refining these methods for over six years, using "living off the land" strategies to demonstrate how attackers bypass physical barriers to compromise isolated systems.

 

In this webcast, we'll dive into the technical mechanics behind these attacks, the operational considerations that make them so effective, and the defensive measures that can help mitigate this emerging threat. By analyzing real-world applications of these techniques, including lessons from advanced persistent threats, you'll gain a deeper understanding of the challenges and solutions for securing wireless environments. This session will equip you with the insights needed to defend against adversaries who are using proximity as a vector for attack.

Speaker and Presenter Information

Larry Pesce

 

James Leyte-Vidal

Relevant Government Agencies

Other Federal Agencies, Federal Government, State & Local Government


Event Type
Webcast


When
Tue, Jan 14, 2025, 2:00pm ET


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Organizer
SANS Institute


Contact Event Organizer



Return to search results