exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 34 RSS Feed

Files

BLUFFS: Bluetooth Forward And Future Secrecy Attacks And Defenses
Posted Nov 30, 2023
Authored by Daniele Antonioli, Sophia Antipolis

Whitepaper titled BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses. It presents six novel attacks affecting chips from many major Bluetooth vendors.

tags | paper
SHA-256 | 348467e3c5ed34a3d7601f57132defd129109109224ba2966ff023f2babfce33
DensePose From WiFi
Posted Jan 23, 2023
Authored by Fernando De la Torre, Jiaqi Geng, Dong Huang

Whitepaper called DensePose From WiFi. It discusses how scientists from Carnegie Mellon University have figured out how to map a human's 3D form by using two wifi routers.

tags | paper, wireless
SHA-256 | 79e410d611cf1fce59906fb6029e819c60c9ad628363ca5b29efc9728ff69195
Passive Inter-Modulation Sources And Cancellation Methods
Posted Mar 24, 2022
Site yupanatech.com

Whitepaper that discusses passive inter-modulation sources and cancellation methods. When two or more signals of different frequencies pass through a nonlinear system, intermodulation distortion (IMD) occurs, resulting in the formation of spurious distortion signals. IMD is most commonly found in active circuits of a radio system, but it can also be found in passive wireless components such as lters, transmission lines, connectors, antennas, attenuators, and so on, especially when transmit power is quite high. Passive intermodulation (PIM) distortion is the name given to the IMD in the latter scenario. With the evolution of radio systems and the scarcity of radio spectrum, PIM interference is being recognized as a potential stumbling block to a radio network's maximum capacity. This article classifies the PIM sources in BS radio systems into two categories, internal and external sources. Internal sources are the radio's passive components such lters, transmission lines, connections, antennas, and so on. External sources, on the other hand, are passive items that are located outside of the BS antenna but inside the RF signal path, such as metallic and rusted objects in the antenna near eld. The high power current flowing through such passive devices can cause nonlinear behavior, resulting in IMD for both types of sources. Also, a review of PIM mitigation techniques is presented in the article.

tags | paper
SHA-256 | cf614fd9aec75f56c27a43e6f47b0a0ad97338db9c10ee853cbd6a9b35d11692
Of Mice And Keyboards
Posted Jun 1, 2017
Authored by Matthias Deeg, Gerhard Klostermeier

Whitepaper call Of Mice and Keyboards. This write up gives you an overview on the security of modern wireless desktop sets.

tags | paper
SHA-256 | a23b6c71f4bc4c2bb5db90ee5bab0a7cd56644257573acdf96d51e19d1e89e12
Denial Of Service Attacks In Wireless Networks
Posted Jan 25, 2015
Authored by Mallikarjun Hangargi

This whitepaper discusses denial of service attacks carried out in WLANs at the physical and MAC layers. It touches on IEEE 802.11 protocol flaws for handling frames at the MAC layer, preventive measures for DoS attacks, and protocol design suggestions.

tags | paper, denial of service, protocol
SHA-256 | 6d910f077be7eb4de49610dc219dbaa4e68eb656e789d18d33b3965e8a9769f4
Open Wi-Fi Hotspots - Threats And Mitigations
Posted Jan 13, 2015
Authored by Renuka Muppavarapu

This is a brief whitepaper that discusses threats and mitigations against those threats when using open wireless access points.

tags | paper
SHA-256 | 0574734d9f9275ddb9dc943efd9df28254d8bcf312ed3e6a17473350b8d1d633
Wifi Packet Capturing / Session Hijacking Using Wireshark
Posted Apr 24, 2014
Authored by Er. Deepanshu Kapoor

This whitepaper details how to perform wifi man in the middle attacks and then sniff the traffic for analysis afterwards using Wireshark.

tags | paper
SHA-256 | ba682f01ac66297c006d03d6d6a391811b8546679c41f35d715ecb25f387a262
Building Wireless IDS Systems Using Open Source
Posted Apr 13, 2012
Authored by Champ Clark III

This is a detailed paper on building your own WAP and Wireless IDS system from scratch using open source tools like Kismet, Snort and Sagan.

tags | paper
SHA-256 | e8493f6ce980099203e0171a505425a6fd32193451e07cab0cf78651fc5eb149
Wi-Fi Security With Wi-Fi Protection Plus
Posted Feb 12, 2012
Authored by Ajin Abraham, Vimal Jyothi

Whitepaper called Wi-Fi Security with Wi-Fi Protection Plus. Wi-Fi P+ is a new security architecture proposed by the authors.

tags | paper
SHA-256 | a1796ef5991f37e305255cca3db5c7cb382fdf8cc9c174e0f73caebf4c6d9270
Brute Forcing Wi-Fi Protected Setup
Posted Dec 29, 2011
Authored by Stefan Viehboeck

This paper discusses a vulnerability in WPS that allows attackers to recover WPA/WPA2 keys in a matter of hours.

tags | paper, wireless
SHA-256 | 3459acb0683358926b929b6818957b6738776254a54447d79a99c502aad973c3
#breaking80211 Whitepaper
Posted Nov 27, 2011
Authored by Aetsu

This whitepaper goes into detail on how to break 802.11 detailing the various attack methodologies and tools needed to perform the attacks. Written in Spanish.

tags | paper
SHA-256 | db2e01888753073cc48af12d04fdc0fce7a3a6f5d76f0cf0f4036c28964010c6
Wireless Hacking And Wireless Security
Posted Oct 1, 2011
Authored by Suman Sah

This paper examines network layer security provided by IPSec and link layer security provided by WPA, addressing the characteristics of each approach when applied to wireless networks. It also discusses types of attack done on Wireless/Wi-Fi and security mitigations.

tags | paper
SHA-256 | 30f079292e126b6757e81232dfdb4f5e11ee01e8b0b8be39876b06cf34a9f6ae
Hacking Wifi Networks On Windows
Posted Sep 16, 2011
Authored by Kevin John

This is an e-book called Hacking Wifi Networks On Windows. It primarily focuses on cracking WEP.

tags | paper
systems | windows
SHA-256 | 27337d4f71becb39e2b9e4355352494736f4a9f97170b086769dab940dd0e2f9
Jugando En La Red
Posted Aug 11, 2011
Authored by Aetsu

Whitepaper called Jugando en la red. This tutorial focuses on using Backtrack 4 RC2 to hack wireless. Written in Spanish.

tags | paper
SHA-256 | 49ab9a712c223e031e00ce7e89adcb97b2687ab92b432230c49afcfb1b61fb51
Asaltando Redes Wi-Fi
Posted Aug 11, 2011
Authored by Aetsu

Whitepaper called Asaltando Redes Wi-Fi. This manual explains how to crack WEP to recover a password. Written in Spanish.

tags | paper
SHA-256 | cf2e1b7ec9e6852b5d0c7bd1a949d48876475ba8ad49f9dbca3206ebcb57148b
Weaponizing Wireless Networks
Posted Nov 2, 2010
Authored by Neeli R. Prasad, Tassos Dimitriou, Thanassis Giannetsos

Whitepaper called Weaponizing Wireless Networks: An Attack Tool For Launching Attacks Against Sensor Networks.

tags | paper
SHA-256 | c859b76bf4708da35aa34cb42017fa87e93cd3b846c3c42a7bbf3454cc857b6e
Break The Encryption WEP In Wireless Networks
Posted Sep 13, 2010
Authored by rOckHuntEr

Whitepaper called Break The Encryption WEP In Wireless Networks. Written in Arabic.

tags | paper
SHA-256 | 8119c25ef347fa5fccd14f282f70db459bb1e41651fe81d269480a6303dc8564
Whitepaper Called Using Aircrack-ng
Posted Apr 3, 2010
Authored by XEL

This is a whitepaper called Using Aircrack-ng. Written in Hungarian.

tags | paper
SHA-256 | b108dd5ccc2e7b4c2dfa95ffe6f7eb42a126279b5a582f612b3a868b39cf0035
WEP Cracking Whitepaper
Posted Jan 22, 2010
Authored by r3v3r7

Whitepaper regarding WEP cracking. Written in Bahasa Melayu.

tags | paper
SHA-256 | f0d734b449b0bb0ab316183a4b162d9a57b699e4a4579390a1d7ac93f42b4196
Common Attacks Against Wireless Networks Part 1
Posted Dec 17, 2009
Authored by Hamid Kashfi

Whitepaper called Common Attacks Against Wireless Networks - Part 1. Written in Persian.

tags | paper
SHA-256 | 39b9b91a207fed9b811f2eb867d1680ba1fc48149683135c75ef9d18245dd731
Securing Our Wireless Network
Posted Sep 2, 2009
Authored by Cygog

Whitepaper called Securing our wireless network. Written in Spanish.

tags | paper
SHA-256 | 8891779ba3c62d212ae7188573b4ddcabc66f926d78b3f30fc065f22a82c8137
A Practical Message Falsification Attack On WPA
Posted Aug 26, 2009
Authored by Masakatu Morii, Toshihiro Ohigashi

Whitepaper called A Practical Message Falsification Attack on WPA.

tags | paper
SHA-256 | e4508ac705e974e5997e8f259c77fb0c5a4426a86c4bc54012872d08daa7d98d
Cracking The Air, The Other Way
Posted Jul 1, 2009
Authored by HitThemHard

Whitepaper called Cracking The Air, The Other Way.

tags | paper
SHA-256 | 2f616c2aa5909e800b2f02e8e19c0113c3f73f10df259a07280f08fcf8e7e27d
The FMS Explanation
Posted May 25, 2009
Authored by Saitek | Site saitek.altervista.org

Whitepaper called How Do I Crack Your WEP: The FMS Attack Explanation. Written in Italian.

tags | paper
SHA-256 | 2370a8ac5f10c5e45ca9fc7af76d2290a878ed122c845ab2f0992dd048d5f459
Wordlist Cracking WPA/WPA2-PSK
Posted Mar 9, 2009
Authored by ka0x

Whitepaper discussing the cracking of WPA and WPA-PSK with a wordlist. Written in Spanish.

tags | paper
SHA-256 | c270bbe7135098af512abffe5708f49a05055f3714422fb5eb2184f8ab403732
Page 1 of 2
Back12Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close