28.05.2016 Views

CLOSING KEYNOTE

D2T2%20-%20Peter%20blasty%20Geissler%20-%20Breaking%20Naive%20ESSID%20WPA2%20Key%20Generation%20Algorithms

D2T2%20-%20Peter%20blasty%20Geissler%20-%20Breaking%20Naive%20ESSID%20WPA2%20Key%20Generation%20Algorithms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

IN STICKERS WE TRUST - BLASTY @ HITBAMS2016<br />

PRIOR WORK BY OTHERS<br />

▸ st_keys.c (Kevin Devine, March 2008)<br />

▸ Scrutinizing WPA2 Password Generating Algorithms in<br />

Wireless Routers (Eduardo Novella Lorente, Carlo Meijer, Roel Verdult)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!