The presentation discusses the speaker's experience monitoring wireless networks at DEF CON for three years, and the risks and vulnerabilities associated with using wireless networks. The speaker provides countermeasures and protection strategies to avoid data capture.
- The speaker has been monitoring wireless networks at DEF CON for three years
- The presentation discusses the successes and failures of the speaker's monitoring projects, including the creation of the WiFiCactus and the data captured
- The presentation aims to bring clarity to the wireless environment at DEF CON and demonstrate the risks of using wireless networks
- The speaker provides countermeasures and protection strategies to avoid data capture
- Wireless attacks, such as deauthentication attacks and key reinstallation attacks, are common at DEF CON
- Data leaks, such as latitude and longitude information, can be captured through unencrypted DNS and APIs
The speaker's initial attempt to monitor all the Wi-Fi networks at DEF CON using a single board computer and wireless antennas in their backpack was unsuccessful, but led to the creation of the WiFiCactus. The WiFiCactus solved the problem of missing data by using more radios per box. The speaker also observed various wireless attacks and data leaks, such as deauthentication attacks and latitude and longitude information being leaked through APIs.