Description: The Caffe Latte Attack was discovered by me and my colleagues MD Sohail and Amit Vartak when i was at Airtight Networks . In brief, the Caffe Latte Attack can be used to break the WEP key from just the Client, without needing the presence of the Access Point. The attack is carried out by luring the Client to connect to a hacker setup HoneyPot. Once the Client is connected the Hacker can use a bit flipping attack to have the client repond to ARP request packets. Once a larger number of the Client reponses are collected a hacker could use tools like Aircrack-ng to crack the WEP key. In this demo we shall use the PTW WEP attack to break the encryption key.
I had presented the attack at Toorcon 9. The attack created quite a scare and was widely covered by various media outlets. My favourite coverage is the detailed explanation written by Lisa Phifer on Wifi Planet - The Caffe Latte Attack and How to Block It .
Rick Farina from Airtight Networks and I, gave a demo to Lisa over webex and she took screenshots of it and posted them with the article. Interestingly, the demo consisted of demonstrating the Caffe Latte Attack against Apple's iPhone. This video is the demo recorded by Rick while we cracked the WEP key in the iPhone. This hack was later covered by CBS5 news channel.
Tags: tools ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.