Paul's Security Weekly (Audio)

Airsnitch, Claude, Hacking Firewalls - PSW #916

4 snips
Mar 5, 2026
Wireless client isolation flaws and AirSnitch techniques like ARP spoofing and GTK abuse. Network appliance risks from Linux-based OSes, Cisco SD‑WAN advisories, and limited defender visibility. Large-scale signed Windows driver fuzzing and kernel bug exposure. BLE/TPMS tracking, Claude-assisted detector prototyping, and hacking consumer devices to extend lifespan. Policy debates on banning certain AI models and age verification impacts.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Attackers Favor Linux-Based Network Appliances

  • Cisco SD‑WAN and other network appliances are often Linux-based and have been exploited in the wild since 2023.
  • Attackers prefer targeting appliance OSes because they expose familiar Linux services and lower engineering friction than hardened Windows endpoints.
ADVICE

Harden Endpoints To Shift Attacker Focus

  • Don't assume Windows is easy; leverage native protections (Secure Boot, Defender, BitLocker) and plan for higher-effort bypasses if targeting desktops.
  • For defenders, harden endpoints to force attackers toward less-protected network appliances.
INSIGHT

Signed Drivers Are A Stealthy Attack Surface

  • Signed drivers remain an attack vector because there's no easy public attestation API to enumerate what Microsoft has signed on endpoints.
  • Attackers can target vulnerable signed drivers to gain privileged capabilities that bypass EDRs.
Get the Snipd Podcast app to discover more snips from this episode
Get the app