recentpopularlog in

whip_lash : wireless   16

New Dragonblood vulnerabilities found in WiFi WPA3 standard | ZDNet
But besides just disclosing the two new Dragonblood vulnerabilities, the two researchers also took the chance to criticize the WiFi Alliance again for its closed standards development process that doesn't allow for the open-source community to contribute and prevent big vulnerabilities from making it into the standard in the first place.

"This demonstrates that implementing Dragonfly and WPA3 without side-channel leaks is surprisingly hard," the researchers said. "It also, once again, shows that privately creating security recommendations and standards is at best irresponsible and at worst inept."
wpa3  wireless  wifi 
22 days ago by whip_lash
SecuritySynapse: Wireless Pentesting on the Cheap (Kali + TL-WN722N) - WPA-PSK
In our previous article we used TP-Link’s TL-WN722N and a Kali Virtual Machine (VM) to perform wireless discovery and attack against a Wired Equivalent Privacy (WEP) network to showcase the abilities of this inexpensive and flexible setup.  In this article we will continue to test our setup by attacking our home router running WPA (Pre-Shared Key) PSK--walking you through the attack from start to finish.
cybersecurity  kali  pentest  wireless 
april 2019 by whip_lash
GitHub - virtualabs/btlejack: Bluetooth Low Energy Swiss-army knife
Favorite tweet:

With a small patch, the new @virtualabs #BLE #hacking sniffing and hijacking tool BtleJack (https://t.co/nZau2voC2C) works not only on BBC micro:bit, but also on a $3 bare nRF51822 modules. More details soon! pic.twitter.com/T4wYRoBkyp

— Slawomir Jasek (@slawekja) August 12, 2018
bluetooth  github  wireless  micro:bit 
august 2018 by whip_lash
calebmadrigal/trackerjacker: Like nmap for mapping wifi networks you're not connected to, plus device tracking
Like nmap for mapping wifi networks you're not connected to. Maps and tracks wifi networks and devices through raw 802.11 monitoring.
network  python  security  wifi  wireless  pentest  github 
june 2018 by whip_lash
Top Five Ways I gained access to Your Corporate Wireless Network (Lo0tBo0ty KARMA edition)
I’ve been able to snag credentials for EAP and TTLS networks ,where other Evil Twins fail. A set of valid user credentials can allow privilege escalation and persistence that can take a red team sometimes week to establish.
wireless  pentest  security 
march 2018 by whip_lash
inSSIDer | MetaGeek
nSSIDer is an award-winning free Wi-Fi network scanner for Windows Vista and Windows XP. Because NetStumbler doesn't work well with Vista and 64-bit XP, we built an open-source Wi-Fi network scanner designed for the current generation of Windows operating systems. A year later, inSSIDer was discussed by Lifehacker and Tekzilla!
wifi  wireless  windows  software  tools  network 
july 2009 by whip_lash
IPhones flooding wireless LAN at Duke University - Network World
The misbehaving iPhones flood the access points with up to 18,000 address requests per second, nearly 10Mbps of bandwidth, and monopolizing the AP’s airtime. The access points show up as “out of service.”
network  wifi  wireless 
july 2007 by whip_lash
Got Interference? Data-Crowding Problems Loom for Wi-Fi
Until access points and other wireless-networking hardware can adapt in real time to interference in a way similar to MetroFi's municipal network nodes, then wireless chatter will continue to be a problem.
wifi  wireless  networkengineering 
july 2007 by whip_lash
Ubuntu Forums - View Single Post - Stop having to enter keyring over and over again
Now you shouldnt have to enter your keyring each time you connect to a wifi
ubuntu  wireless  tips 
july 2007 by whip_lash
Upside-Down-Ternet
My neighbours are stealing my wireless internet access. I could encrypt it or alternately I could have fun.
security  wireless  tech  humor 
may 2007 by whip_lash

Copy this bookmark:





to read