This whitepaper describes a new technique for generating large WPA-PSK tables to be used for cracking wireless networks. The concept involves injecting malicious Javascript code to a large websites and forcing user browsers to fetch data from attacker's server, compute PBKDF2 hash and send it back. In some conditions this can lead to creation of a large, parasitic, distributed network used for effective hash computing.
99ac0d2cf309c8a7602c8208cff58c080f4c970d27b9330ea7289fcbb966d844
Whitepaper called Wi-Foo Ninjitsu Exploitation. It touches on methods of cracking keys, tools involved, and how to break basic simple defenses.
f73687ecb0c453b0161adb863066bbad00c22a65d1479f219fa5be0605bb517b
Whitepapger entitled Practical Attacks Against WEP and WPA.
0552f9b277abd7b0a1b272f620935f58ea75d97f0cb3b61d27b7b32ffe589f86
Whitepaper entitled Dismantling MIFARE Classic, the contactless smart card used extensively in access control for office buildings, payment systems, etc.
1a1cb91384293343bae8c16815274210db3d6cad2532fb4706551e54f0cece94
27 Mhz Wireless Keyboard Analysis Report aka "We know what you typed last summer".
4031665158f89095b76522ddf109f7e9470a039ede93a4d0567d8c5498ed3f04
wireless_tools: The Guide to the Goods.
6aeb4992d1be4aeb2a07fd8f9e1eb5b87ffd0257a73c68846a10161a9979915d
Brief whitepaper discussing research performed analyzing whether or not a 30 dollar Bluetooth dongle could be transformed into a full blown Bluetooth sniffer.
f3a4af82e005cae51da0d0956e317435cb453b6bea93a309c7b3d0a113cfc977
802.11 Hack The Mac research report that offers in-depth protocol mechanics analysis, at the 802.11 MAC and PHY layers, with emphasis on research and implementation of Denial of Service and disruption exploits of a wireless cell and active 802.11 stations on the cell.
9f405fa5d9e7a68dfc4e11274af36a25417406db13aa81ae9f50e89f4671a3fe
This paper describes the wireless LAN standards, WLAN Architecture and Security, Authentication, WEP, and more.
9f392febd9924d4bddb9cf37435d3ffd7d215082566ed60870db6bffe4093471