Chapter
Clips
Learn how hackers can use Karma attacks to exploit the vulnerabilities of public Wi-Fi networks and spoofed access points to gain access to sensitive information and take over machines.
41:58 - 44:45 (02:46)
Summary
Learn how hackers can use Karma attacks to exploit the vulnerabilities of public Wi-Fi networks and spoofed access points to gain access to sensitive information and take over machines.
ChapterThe Dangers of Fake Wi-Fi Access Points
Episode114: HD
PodcastDarknet Diaries
The speaker discusses their approach to reporting vulnerabilities to vendors and a dead man's switch strategy they use to make sure vulnerabilities are addressed in a timely manner, citing the example of Trend Micro publicly disclosing zero days on HP due to the vendor not fixing their vulnerabilities quickly enough.
44:45 - 46:54 (02:09)
Summary
The speaker discusses their approach to reporting vulnerabilities to vendors and a dead man's switch strategy they use to make sure vulnerabilities are addressed in a timely manner, citing the example of Trend Micro publicly disclosing zero days on HP due to the vendor not fixing their vulnerabilities quickly enough.