Pyrittakes a step ahead in attacking WPA-PSK and WPA2-PSK, the protocols that protect today's public WIFI-airspace. Pyrit's implementation allows to create massive databases, pre-computing part of the WPA/WPA2-PSK authentication phase in a space-time-tradeoff. The performance gain for real-world-attacks is in the range of three orders of magnitude which urges for re-consideration of the protocol's security. Exploiting the computational power of Many-Core- and other platforms through ATI-Stream, Nvidia CUDA, OpenCL and VIA Padlock.
In this video, Thomas shows us how to modify an MSN conversation at the network level. He uses an Ettercap filter and MITM attack to make this happen. The basic idea is to hijack the victim's Layer 2 and have all his traffic go through the attacker. Then the attacker can modify the traffc on the fly and inject it back into the network.