what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 34 of 34 RSS Feed

Files

Parasitic Approach To Cracking WPA Passwords
Posted Feb 26, 2009
Authored by Michal Rogala | Site michalrogala.com

This whitepaper describes a new technique for generating large WPA-PSK tables to be used for cracking wireless networks. The concept involves injecting malicious Javascript code to a large websites and forcing user browsers to fetch data from attacker's server, compute PBKDF2 hash and send it back. In some conditions this can lead to creation of a large, parasitic, distributed network used for effective hash computing.

tags | paper, javascript
SHA-256 | 99ac0d2cf309c8a7602c8208cff58c080f4c970d27b9330ea7289fcbb966d844
Whitepaper Called Wi-Foo Ninjitsu Exploitation
Posted Feb 25, 2009
Authored by CWH Underground | Site citecclub.org

Whitepaper called Wi-Foo Ninjitsu Exploitation. It touches on methods of cracking keys, tools involved, and how to break basic simple defenses.

tags | paper
SHA-256 | f73687ecb0c453b0161adb863066bbad00c22a65d1479f219fa5be0605bb517b
practical-wepwpa.pdf
Posted Nov 10, 2008
Authored by Erik Tews, Martin Beck

Whitepapger entitled Practical Attacks Against WEP and WPA.

tags | paper
SHA-256 | 0552f9b277abd7b0a1b272f620935f58ea75d97f0cb3b61d27b7b32ffe589f86
2008-esorics.pdf
Posted Oct 22, 2008
Authored by flaviog, petervr, ronny, bart, gkoningg, rmuijrer, rverdult

Whitepaper entitled Dismantling MIFARE Classic, the contactless smart card used extensively in access control for office buildings, payment systems, etc.

tags | paper
SHA-256 | 1a1cb91384293343bae8c16815274210db3d6cad2532fb4706551e54f0cece94
27_Mhz_keyboard_insecurities.pdf
Posted Dec 2, 2007
Authored by Max Moser, Philipp Schrodel | Site remote-exploit.org

27 Mhz Wireless Keyboard Analysis Report aka "We know what you typed last summer".

tags | paper
SHA-256 | 4031665158f89095b76522ddf109f7e9470a039ede93a4d0567d8c5498ed3f04
wireless_tools-guide.txt
Posted Aug 11, 2007
Authored by skew

wireless_tools: The Guide to the Goods.

tags | paper
SHA-256 | 6aeb4992d1be4aeb2a07fd8f9e1eb5b87ffd0257a73c68846a10161a9979915d
busting_bluetooth_myth.pdf
Posted Apr 2, 2007
Authored by Max Moser | Site remote-exploit.org

Brief whitepaper discussing research performed analyzing whether or not a 30 dollar Bluetooth dongle could be transformed into a full blown Bluetooth sniffer.

tags | paper
SHA-256 | f3a4af82e005cae51da0d0956e317435cb453b6bea93a309c7b3d0a113cfc977
HTM80211.pdf
Posted Jun 12, 2006
Site amilabs.com

802.11 Hack The Mac research report that offers in-depth protocol mechanics analysis, at the 802.11 MAC and PHY layers, with emphasis on research and implementation of Denial of Service and disruption exploits of a wireless cell and active 802.11 stations on the cell.

tags | paper, denial of service, protocol
SHA-256 | 9f405fa5d9e7a68dfc4e11274af36a25417406db13aa81ae9f50e89f4671a3fe
wlan-whitepaper.txt
Posted Dec 4, 2002
Authored by Josh Glenn

This paper describes the wireless LAN standards, WLAN Architecture and Security, Authentication, WEP, and more.

tags | paper
SHA-256 | 9f392febd9924d4bddb9cf37435d3ffd7d215082566ed60870db6bffe4093471
Page 2 of 2
Back12Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
Over A Million Neighbourhood Watch Members Exposed
Posted Apr 23, 2024

tags | headline, privacy, britain, data loss
MITRE Hacked By State Sponsored Group Via Ivanti Zero Days
Posted Apr 23, 2024

tags | headline, hacker, government
Russia's Sandworm APT Linked To Attack On Texas Water Plant
Posted Apr 18, 2024

tags | headline, malware, usa, russia, cyberwar, scada
EU Tells Meta It Can't Paywall Privacy
Posted Apr 18, 2024

tags | headline, government, privacy, facebook, social
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close