When the Nearest Neighbor becomes the Nearest Adversary
Discover the covert world of wireless network exploitation in our webcast on the "Nearest Neighbor Attack," as recently detailed by Volexity. This attack leverages nearby Wi-Fi networks for covert access, weaponizing proximity in an innovative and stealthy way. Join us as we explore how these techniques have long been a part of advanced wireless exploitation. As instructors and authors for the SANS SEC617: Wireless Penetration Testing and Ethical Hacking, we have been teaching and refining these methods for over six years, using "living off the land" strategies to demonstrate how attackers bypass physical barriers to compromise isolated systems.
In this webcast, we'll dive into the technical mechanics behind these attacks, the operational considerations that make them so effective, and the defensive measures that can help mitigate this emerging threat. By analyzing real-world applications of these techniques, including lessons from advanced persistent threats, you'll gain a deeper understanding of the challenges and solutions for securing wireless environments. This session will equip you with the insights needed to defend against adversaries who are using proximity as a vector for attack.
Speaker and Presenter Information
Relevant Government Agencies
Other Federal Agencies, Federal Government, State & Local Government
Event Type
Webcast
When
Tue, Jan 14, 2025, 2:00pm
ET
Cost
Complimentary: $ 0.00
Website
Click here to visit event website
Organizer
SANS Institute