Wireless Security Mode:
(Page 6 of 49)  < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >
WiFiFoFum radar 2009-10-09
Robin Wood (dninja gmail com)
Hi
A friend has just demoed WiFiFoFum on his iPhone and we were trying to
work out how the radar feature worked. An AP we were watching appeared
to always stay in the correct position on the radar when we rotated
the phone.

Anyone know how this works?

Robin

[ more ]  [ reply ]
WPA Encryption 2009-10-05
AFH Security (security afallenhope com) (4 replies)
I've been looking for tutorials or articles on the weakness in the WPA
protocol. I've been able to capture my handshake, and I've used the
aircrack-ng suite, but never am I able to find my password. Mind you
it's something extremely simple, but it's not found in any dictionaries.
I was told you can

[ more ]  [ reply ]
Re: WPA Encryption 2009-10-06
Mike Duncan (Mike Duncan noaa gov)
Re: WPA Encryption 2009-10-05
Taras (taras securityaudit ru)
Re: WPA Encryption 2009-10-05
Robin Wood (dninja gmail com)
Re: WPA Encryption 2009-10-05
Fatah al Farihin (fathkay yahoo com)
WiFi Power Save Denial of Service 2009-09-21
Leandro Federico Meiners (leandro meiners coresecurity com)
Hi list!

Last week I presented a DoS against WiFi, which consists in abusing the
power-save features of the standard, at Ekoparty. The following link
points to the slides, a whitepaper with some more technical details and
a PoC tool.

http://corelabs.coresecurity.com/index.php?module=Wiki&action=vi

[ more ]  [ reply ]
removing PPI headers 2009-09-17
Robin Wood (dninja gmail com) (3 replies)
Hi
I've got some pcap files from Kismet Newcore but can't do much with
them because they have PPI headers. Wireshark will open them but
tcpdump and ngrep both refuse. I tried to remove them with Josh's
wlan2eth but that also refuses to work.

Has anyone got any tools that will remove these headers?

[ more ]  [ reply ]
Re: removing PPI headers 2009-09-18
Joshua Wright (jwright hasborg com) (1 replies)
Re: removing PPI headers 2009-09-18
Robin Wood (dninja gmail com)
Re: removing PPI headers 2009-09-17
Joshua Wright (jwright hasborg com)
Re: removing PPI headers 2009-09-17
Cedric Blancher (blancher cartel-securite fr)
MS09-049: Vista Wireless LAN Autoconfig Service Code Execution Vulnerability 2009-09-11
Joshua Wright (jwright hasborg com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm including a write-up from the SANS @RISK vulnerability alert system
below. With Vista, Microsoft re-wrote the native wireless stack,
reducing the amount of packet-handling code an independent hardware
vendor (IHV) had to do and standardizing the fu

[ more ]  [ reply ]
Re: Caller ID Spoofing in GSM Networks 2009-08-20
Maria Valen (maria valen006 gmail com)
May be it cannot be done by installing software on the phone. However,
what if I set up an asterisk box and get connected to a SIP provider?
Then do a few scripts and I am probably done with both of my demos?
What the house has to say on this? Is this the right way to go?

Maria

On 8/20/09, cAs <wr

[ more ]  [ reply ]
Caller ID Spoofing in GSM Networks 2009-08-19
Maria Valen (maria valen006 gmail com) (1 replies)
Folks!

I am studying possible methods and techniques by which someone can
spoof caller ID in GSM networks. In fact, I have to prepare a demo
demonstrating two things:

1- Caller ID spoofing
2- Flood a cell/phone with multiple successive calls/SMS appearing to
come from different numbers.

What do I

[ more ]  [ reply ]
RE: Caller ID Spoofing in GSM Networks 2009-08-20
Kevin Reiter (KReiter insidefsi net)
[OT] Connect a Logilink with an external antenna 2009-08-13
Salvatore Fresta aka Drosophila (drosophilaxxx gmail com)
Hi guys,

I've a doubt. I want to buy a Logilink WL0025 that has a SMA
connector. Can I connect an external antenna with a RP-SMA connector
like this http://www.tp-link.com/products/product_des.asp?id=62 ???

Logilink WL0025: http://www.logilink.org/showproduct/WL0025.htm

Best regards.

--
Salva

[ more ]  [ reply ]
Why do I see only downstream traffic? 2009-08-12
Maria Valen (maria valen006 gmail com) (2 replies)
Hi

I am trying to sniff traffic in a wireless network using wireshark.
Without going into promiscuous mode I can see my neighbour downstream
traffic i.e. traffic from AP to the end users. Same case even if I use
promiscuous mode. I dont see any upstream traffic?

Can somebody please explain this?

[ more ]  [ reply ]
Re: Why do I see only downstream traffic? 2009-08-12
Mike Kershaw (dragorn kismetwireless net)
Re: Why do I see only downstream traffic? 2009-08-12
Dusan Mulac (dmulac gmail com)
Re: differentiating wired and wireless clients in Kismet 2009-07-30
Robin Wood (dninja gmail com) (1 replies)
2009/7/30 Joshua Wright <jwright (at) hasborg (dot) com [email concealed]>:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
>>> link[1] || 0x03 == 0x01
>
>> This is getting closer but for some reason the apple macs that I've
>> got in my test environment are never being picked up by this and
>> kismet always shows them as f

[ more ]  [ reply ]
Re: differentiating wired and wireless clients in Kismet 2009-07-30
Joshua Wright (jwright hasborg com)
Wi-Fi Alliance Expands WPA2 to include EAP-AKA, EAP-FAST 2009-07-28
Joshua Wright (jwright hasborg com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Yesterday the Wi-Fi Alliance announced an expanded testing regimen for
WPA2 including the EAP-AKA and EAP-FAST authentication methods.

http://www.wi-fiplanet.com/news/article.php/3831746

When I was working at Aruba Networks, I spoke up against the inc

[ more ]  [ reply ]
RE: The great WiFi robbery: police to patrol down your street 2009-07-22
Dr John Halewood (john unidec co uk)
> Some ISPs in the UK still ship their routers to their clients
> with WEP enabled security. I think that's unacceptable, and
> they should share responsibility if/when their users are exploited.

It's not just ISPs. One of the firms I do quite a lot of work for (large UK
company) still has all th

[ more ]  [ reply ]
Using Metasploit DD-WRT Exploit Module Thru Pivot 2009-07-22
Seth Fogie (seth airscanner com)
Carlos over at Pauldotcom.com illustrates how a vulnerable DD-WRT build
can be targeted with metasploit.

http://pauldotcom.com/2009/07/using-metasploit-dd-wrt-exploi.html

Just an FYI.

Seth

[ more ]  [ reply ]
(Page 6 of 49)  < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus