Whitepaper titled BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses. It presents six novel attacks affecting chips from many major Bluetooth vendors.
348467e3c5ed34a3d7601f57132defd129109109224ba2966ff023f2babfce33
Whitepaper called DensePose From WiFi. It discusses how scientists from Carnegie Mellon University have figured out how to map a human's 3D form by using two wifi routers.
79e410d611cf1fce59906fb6029e819c60c9ad628363ca5b29efc9728ff69195
Whitepaper that discusses passive inter-modulation sources and cancellation methods. When two or more signals of different frequencies pass through a nonlinear system, intermodulation distortion (IMD) occurs, resulting in the formation of spurious distortion signals. IMD is most commonly found in active circuits of a radio system, but it can also be found in passive wireless components such as lters, transmission lines, connectors, antennas, attenuators, and so on, especially when transmit power is quite high. Passive intermodulation (PIM) distortion is the name given to the IMD in the latter scenario. With the evolution of radio systems and the scarcity of radio spectrum, PIM interference is being recognized as a potential stumbling block to a radio network's maximum capacity. This article classifies the PIM sources in BS radio systems into two categories, internal and external sources. Internal sources are the radio's passive components such lters, transmission lines, connections, antennas, and so on. External sources, on the other hand, are passive items that are located outside of the BS antenna but inside the RF signal path, such as metallic and rusted objects in the antenna near eld. The high power current flowing through such passive devices can cause nonlinear behavior, resulting in IMD for both types of sources. Also, a review of PIM mitigation techniques is presented in the article.
cf614fd9aec75f56c27a43e6f47b0a0ad97338db9c10ee853cbd6a9b35d11692
Whitepaper call Of Mice and Keyboards. This write up gives you an overview on the security of modern wireless desktop sets.
a23b6c71f4bc4c2bb5db90ee5bab0a7cd56644257573acdf96d51e19d1e89e12
This whitepaper discusses denial of service attacks carried out in WLANs at the physical and MAC layers. It touches on IEEE 802.11 protocol flaws for handling frames at the MAC layer, preventive measures for DoS attacks, and protocol design suggestions.
6d910f077be7eb4de49610dc219dbaa4e68eb656e789d18d33b3965e8a9769f4
This is a brief whitepaper that discusses threats and mitigations against those threats when using open wireless access points.
0574734d9f9275ddb9dc943efd9df28254d8bcf312ed3e6a17473350b8d1d633
This whitepaper details how to perform wifi man in the middle attacks and then sniff the traffic for analysis afterwards using Wireshark.
ba682f01ac66297c006d03d6d6a391811b8546679c41f35d715ecb25f387a262
This is a detailed paper on building your own WAP and Wireless IDS system from scratch using open source tools like Kismet, Snort and Sagan.
e8493f6ce980099203e0171a505425a6fd32193451e07cab0cf78651fc5eb149
Whitepaper called Wi-Fi Security with Wi-Fi Protection Plus. Wi-Fi P+ is a new security architecture proposed by the authors.
a1796ef5991f37e305255cca3db5c7cb382fdf8cc9c174e0f73caebf4c6d9270
This paper discusses a vulnerability in WPS that allows attackers to recover WPA/WPA2 keys in a matter of hours.
3459acb0683358926b929b6818957b6738776254a54447d79a99c502aad973c3
This whitepaper goes into detail on how to break 802.11 detailing the various attack methodologies and tools needed to perform the attacks. Written in Spanish.
db2e01888753073cc48af12d04fdc0fce7a3a6f5d76f0cf0f4036c28964010c6
This paper examines network layer security provided by IPSec and link layer security provided by WPA, addressing the characteristics of each approach when applied to wireless networks. It also discusses types of attack done on Wireless/Wi-Fi and security mitigations.
30f079292e126b6757e81232dfdb4f5e11ee01e8b0b8be39876b06cf34a9f6ae
This is an e-book called Hacking Wifi Networks On Windows. It primarily focuses on cracking WEP.
27337d4f71becb39e2b9e4355352494736f4a9f97170b086769dab940dd0e2f9
Whitepaper called Jugando en la red. This tutorial focuses on using Backtrack 4 RC2 to hack wireless. Written in Spanish.
49ab9a712c223e031e00ce7e89adcb97b2687ab92b432230c49afcfb1b61fb51
Whitepaper called Asaltando Redes Wi-Fi. This manual explains how to crack WEP to recover a password. Written in Spanish.
cf2e1b7ec9e6852b5d0c7bd1a949d48876475ba8ad49f9dbca3206ebcb57148b
Whitepaper called Weaponizing Wireless Networks: An Attack Tool For Launching Attacks Against Sensor Networks.
c859b76bf4708da35aa34cb42017fa87e93cd3b846c3c42a7bbf3454cc857b6e
Whitepaper called Break The Encryption WEP In Wireless Networks. Written in Arabic.
8119c25ef347fa5fccd14f282f70db459bb1e41651fe81d269480a6303dc8564
This is a whitepaper called Using Aircrack-ng. Written in Hungarian.
b108dd5ccc2e7b4c2dfa95ffe6f7eb42a126279b5a582f612b3a868b39cf0035
Whitepaper regarding WEP cracking. Written in Bahasa Melayu.
f0d734b449b0bb0ab316183a4b162d9a57b699e4a4579390a1d7ac93f42b4196
Whitepaper called Common Attacks Against Wireless Networks - Part 1. Written in Persian.
39b9b91a207fed9b811f2eb867d1680ba1fc48149683135c75ef9d18245dd731
Whitepaper called Securing our wireless network. Written in Spanish.
8891779ba3c62d212ae7188573b4ddcabc66f926d78b3f30fc065f22a82c8137
Whitepaper called A Practical Message Falsification Attack on WPA.
e4508ac705e974e5997e8f259c77fb0c5a4426a86c4bc54012872d08daa7d98d
Whitepaper called Cracking The Air, The Other Way.
2f616c2aa5909e800b2f02e8e19c0113c3f73f10df259a07280f08fcf8e7e27d
Whitepaper called How Do I Crack Your WEP: The FMS Attack Explanation. Written in Italian.
2370a8ac5f10c5e45ca9fc7af76d2290a878ed122c845ab2f0992dd048d5f459
Whitepaper discussing the cracking of WPA and WPA-PSK with a wordlist. Written in Spanish.
c270bbe7135098af512abffe5708f49a05055f3714422fb5eb2184f8ab403732