the original cloud security
Showing 1 - 25 of 31 RSS Feed

Files

Of Mice And Keyboards
Posted Jun 1, 2017
Authored by Matthias Deeg, Gerhard Klostermeier

Whitepaper call Of Mice and Keyboards. This write up gives you an overview on the security of modern wireless desktop sets.

tags | paper
MD5 | 82baeb29b56fe4569ce8c6faa36623bc
Denial Of Service Attacks In Wireless Networks
Posted Jan 25, 2015
Authored by Mallikarjun Hangargi

This whitepaper discusses denial of service attacks carried out in WLANs at the physical and MAC layers. It touches on IEEE 802.11 protocol flaws for handling frames at the MAC layer, preventive measures for DoS attacks, and protocol design suggestions.

tags | paper, denial of service, protocol
MD5 | ffd7ad691a5197e6b9af1e807999dbc6
Open Wi-Fi Hotspots - Threats And Mitigations
Posted Jan 13, 2015
Authored by Renuka Muppavarapu

This is a brief whitepaper that discusses threats and mitigations against those threats when using open wireless access points.

tags | paper
MD5 | 896a8d9c6487b5a4a17890527d00de0e
Wifi Packet Capturing / Session Hijacking Using Wireshark
Posted Apr 24, 2014
Authored by Er. Deepanshu Kapoor

This whitepaper details how to perform wifi man in the middle attacks and then sniff the traffic for analysis afterwards using Wireshark.

tags | paper
MD5 | db21df58359e06562d2ba8252fc56a9d
Building Wireless IDS Systems Using Open Source
Posted Apr 13, 2012
Authored by Champ Clark III

This is a detailed paper on building your own WAP and Wireless IDS system from scratch using open source tools like Kismet, Snort and Sagan.

tags | paper
MD5 | 85d955b3b52de4557858a2105b2e4614
Wi-Fi Security With Wi-Fi Protection Plus
Posted Feb 12, 2012
Authored by Ajin Abraham, Vimal Jyothi

Whitepaper called Wi-Fi Security with Wi-Fi Protection Plus. Wi-Fi P+ is a new security architecture proposed by the authors.

tags | paper
MD5 | 16043c7211664d2a65cd89b3424c7fdc
Brute Forcing Wi-Fi Protected Setup
Posted Dec 29, 2011
Authored by Stefan Viehbock

This paper discusses a vulnerability in WPS that allows attackers to recover WPA/WPA2 keys in a matter of hours.

tags | paper, wireless
MD5 | 795e111de4ff159c05752bfb679f8945
#breaking80211 Whitepaper
Posted Nov 27, 2011
Authored by Aetsu

This whitepaper goes into detail on how to break 802.11 detailing the various attack methodologies and tools needed to perform the attacks. Written in Spanish.

tags | paper
MD5 | 030b8153f8f76e124ea858589fa63108
Wireless Hacking And Wireless Security
Posted Oct 1, 2011
Authored by Suman Sah

This paper examines network layer security provided by IPSec and link layer security provided by WPA, addressing the characteristics of each approach when applied to wireless networks. It also discusses types of attack done on Wireless/Wi-Fi and security mitigations.

tags | paper
MD5 | f473a8b84530afd376128889bfc84a33
Hacking Wifi Networks On Windows
Posted Sep 16, 2011
Authored by Kevin John

This is an e-book called Hacking Wifi Networks On Windows. It primarily focuses on cracking WEP.

tags | paper
systems | windows
MD5 | 0093a9365598d077e8a20479a4e6b7c8
Jugando En La Red
Posted Aug 11, 2011
Authored by Aetsu

Whitepaper called Jugando en la red. This tutorial focuses on using Backtrack 4 RC2 to hack wireless. Written in Spanish.

tags | paper
MD5 | 75aafe7eaa8b4b9af7cc5471667a56d6
Asaltando Redes Wi-Fi
Posted Aug 11, 2011
Authored by Aetsu

Whitepaper called Asaltando Redes Wi-Fi. This manual explains how to crack WEP to recover a password. Written in Spanish.

tags | paper
MD5 | 18822868b410e7f1db377c245314015b
Weaponizing Wireless Networks
Posted Nov 2, 2010
Authored by Neeli R. Prasad, Tassos Dimitriou, Thanassis Giannetsos

Whitepaper called Weaponizing Wireless Networks: An Attack Tool For Launching Attacks Against Sensor Networks.

tags | paper
MD5 | cb03e3d5d4fe7be4ab389b47774a2670
Break The Encryption WEP In Wireless Networks
Posted Sep 13, 2010
Authored by rOckHuntEr

Whitepaper called Break The Encryption WEP In Wireless Networks. Written in Arabic.

tags | paper
MD5 | 1a09b3aa5fb55e5ef12436fbd41b3b70
Whitepaper Called Using Aircrack-ng
Posted Apr 3, 2010
Authored by XEL

This is a whitepaper called Using Aircrack-ng. Written in Hungarian.

tags | paper
MD5 | 7754f7220d8315273c03c0719d103bd5
WEP Cracking Whitepaper
Posted Jan 22, 2010
Authored by r3v3r7

Whitepaper regarding WEP cracking. Written in Bahasa Melayu.

tags | paper
MD5 | 53f08fcce8d00d3e8aded1b40337f8a4
Common Attacks Against Wireless Networks Part 1
Posted Dec 17, 2009
Authored by Hamid Kashfi

Whitepaper called Common Attacks Against Wireless Networks - Part 1. Written in Persian.

tags | paper
MD5 | fbfe1a3d2790588873ee709209ba454e
Securing Our Wireless Network
Posted Sep 2, 2009
Authored by Cygog

Whitepaper called Securing our wireless network. Written in Spanish.

tags | paper
MD5 | 9758da7cd10c0b71be4041087fe783de
A Practical Message Falsification Attack On WPA
Posted Aug 26, 2009
Authored by Masakatu Morii, Toshihiro Ohigashi

Whitepaper called A Practical Message Falsification Attack on WPA.

tags | paper
MD5 | a172e81827d2a4de7c0cee24df7d5127
Cracking The Air, The Other Way
Posted Jul 1, 2009
Authored by HitThemHard

Whitepaper called Cracking The Air, The Other Way.

tags | paper
MD5 | f5beb7422ca01613c25dd7adf19514a5
The FMS Explanation
Posted May 25, 2009
Authored by Saitek | Site saitek.altervista.org

Whitepaper called How Do I Crack Your WEP: The FMS Attack Explanation. Written in Italian.

tags | paper
MD5 | 55c713f70902d4567f8936b5105cd70c
Wordlist Cracking WPA/WPA2-PSK
Posted Mar 9, 2009
Authored by ka0x

Whitepaper discussing the cracking of WPA and WPA-PSK with a wordlist. Written in Spanish.

tags | paper
MD5 | 3a751abb852b36af1a5524202634b8c1
Parasitic Approach To Cracking WPA Passwords
Posted Feb 26, 2009
Authored by Michal Rogala | Site michalrogala.com

This whitepaper describes a new technique for generating large WPA-PSK tables to be used for cracking wireless networks. The concept involves injecting malicious Javascript code to a large websites and forcing user browsers to fetch data from attacker's server, compute PBKDF2 hash and send it back. In some conditions this can lead to creation of a large, parasitic, distributed network used for effective hash computing.

tags | paper, javascript
MD5 | ed92afd51bb5a125c6090bd1cfb4ecea
Whitepaper Called Wi-Foo Ninjitsu Exploitation
Posted Feb 25, 2009
Authored by CWH Underground | Site citecclub.org

Whitepaper called Wi-Foo Ninjitsu Exploitation. It touches on methods of cracking keys, tools involved, and how to break basic simple defenses.

tags | paper
MD5 | ac5c9769e76a6c85164568be6d4e7ed8
practical-wepwpa.pdf
Posted Nov 10, 2008
Authored by Erik Tews, Martin Beck

Whitepapger entitled Practical Attacks Against WEP and WPA.

tags | paper
MD5 | 48e2035cea894bcc5cda8173c6115e2e
Page 1 of 2
Back12Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Phishers Getting Smarter By Making Use Of User Location
Posted Oct 20, 2017

tags | headline, malware, cybercrime, fraud, phish
OSX Malware Spread Via Compromised Software Downloads
Posted Oct 20, 2017

tags | headline, malware, apple
Canadian Spooks Release Their Own Malware Detection Tool
Posted Oct 20, 2017

tags | headline, government, malware, canada, spyware
Judge: MalwareTech Is No Longer Under Curfew, GPS Monitoring
Posted Oct 20, 2017

tags | headline, hacker, government, malware, usa, conference
Microsoft Mocks Google For Failed Security Fix Deployment Methodology
Posted Oct 19, 2017

tags | headline, microsoft, flaw, google, chrome
Malicious Mineraft Apps In Google Play Enslave Your Device To A Botnet
Posted Oct 19, 2017

tags | headline, malware, microsoft, phone, botnet, google
OAIC Received 114 Voluntary Data Breach Notifications In Two Years
Posted Oct 19, 2017

tags | headline, hacker, privacy, australia, data loss
US-CERT Predicts Machine Learning To Become Security Risk
Posted Oct 19, 2017

tags | headline, flaw
ATM Malware Available Online For Online $5,000
Posted Oct 18, 2017

tags | headline, malware, bank, cybercrime, fraud
Oracle Swats 252 Bugs In Patch Update
Posted Oct 18, 2017

tags | headline, flaw, patch, oracle
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close