Skip to content →

Conference Talks

Bypassing Port Security in 2018: Defeating MACSEC and 802.1x-2010

Presented at: DEF CON 26DerbyCon 201844conBSides DC

Slides: DEF CON Media Server

Whitepaper: ResearchGate


5GHZ Electronic Warfare

Presented at: Thotcon 2018HackWest 2018BSidesKC 2018

Slides:

5 ghz electronic warfare part i from Digital Silence


The Black Art of Wireless Post-Exploitation: Bypassing Port-Based Access Controls Using Indirect Wireless Pivots

Presented at: DEF CON 25DEF CON 25 (Wall of Sheep)BSides Las Vegas 201744con 2017GRRCon 2017BSides DC 2017,

Slides: The Black Art of Wireless Post-Exploitation – PowerPoint Slides

Whitepaper: GDS Labs


Introducing EAPHammer

Presented at: BlackHat Arsenal 2017DEF CON 25 (Demo Labs)


Beyond Wardriving: Tracking Human Beings Using RF Technology

Presented at: BSides SLC 2017


Slaying Rogue Access Points With Python and Cheap Hardware

Presented at: DEF CON 24 (Wireless Village)BSides SLC 2016BSides Hunstville 2016,

Whitepaper: GDS Labs