Tag: Attack
-
Capture WiFi Credentials with GTC Downgrade
Many security best practices discourage using corporate credentials such as Active Directory for connecting to wireless network. In this post, I’ll demonstrate just how easy it is for an attacker to capture iPhone user corporate credentials in clear text using GTC downgrade attack Background There are a number of protocols available for 802.1x authentication. However, […]