Wireless Security Mode:
(Page 4 of 49)  < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >
Re: Microwave/RF point to point link risk assessment 2010-08-10
Joshua Wright (jwright hasborg com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 8/8/2010 9:30 AM, Info Sec wrote:
> We are an Information Security consulting firm, currently doing
> Risk assessment for our client on various wireless technologies
> like WiMAX, CDMA, EVDO, VSAT, GPRS, point to point Microwave and
> RF. We are look

[ more ]  [ reply ]
Fwd: Trapeze APs 2010-08-08
Robin Wood (robin digininja org) (1 replies)
Has anyone had experience auditing APs from Trapeze? I did a walk
around a client site the other day and saw plenty of APs all of which
had cloaked ESSIDs. Kismet couldn't detect the ESSID and I've manually
gone through the pcap and can't find anything. I know there was wifi
traffic so that wasn't t

[ more ]  [ reply ]
Re: Fwd: Trapeze APs 2010-08-09
PEra (lists sevenlayers org)
Microwave/RF point to point link risk assessment 2010-08-08
Info Sec (infoseccon gawab com)

Hi All,

We are an Information Security consulting firm, currently doing
Risk assessment for our client on various wireless technologies
like WiMAX, CDMA, EVDO, VSAT, GPRS, point to point Microwave and
RF. We are looking for equipment/software tool useful for
testing communication security over Mic

[ more ]  [ reply ]
WPA Migration Mode: WEP is back to haunt you... 2010-08-05
Leandro Meiners (leandro meiners coresecurity com)
Hi list!

Last week Diego Sor and I presented at Black Hat an attack against
Ciscoâ??s WPA Migration Mode, which is a proprietary feature of Cisco
access points that enables both WPA and WEP clients to associate to an
access point using the same Service Set Identifier (SSID). Our attack
allows crack

[ more ]  [ reply ]
WAP fingerprinting: The Wi-Fi Alliance Way 2010-07-02
6e726d (6e726d gmail com)
WPSIG it's a mini tool that does information gathering using WPS
information elements. WPS or Wi-Fi Protected Setup is a standard
created by the Wi-Fi Alliance that allows the users to setup the
security of a Wireless AP in a simple way.

Wireless APs supporting WPS discloses enough information to f

[ more ]  [ reply ]
wifi testing on a Mac 2010-06-20
Robin Wood (robin digininja org) (3 replies)
Has anyone got any good references on wifi testing on a Mac? I haven't
had much time to play yet but I figured that I could just plug a new
card in and it would work but it hasn't picked up any of my existing
cards. I can pass the cards through to a virtual machine so use all
the standard linux tols

[ more ]  [ reply ]
Re: wifi testing on a Mac 2010-06-22
Robin Wood (robin digininja org) (1 replies)
Re: wifi testing on a Mac 2010-06-23
Joshua Wright (jwright hasborg com) (1 replies)
Re: wifi testing on a Mac 2010-06-23
Jeremy Bennett (jeremyfb mac com) (2 replies)
Re: wifi testing on a Mac 2010-06-23
Jeremy Bennett (jeremy bennett gmail com)
Re: wifi testing on a Mac 2010-06-23
Dan Brisson (dbrisson uvm edu) (2 replies)
Re: wifi testing on a Mac 2010-06-23
dragorn kismetwireless net
Re: wifi testing on a Mac 2010-06-23
Jeremy Bennett (jeremyfb mac com) (1 replies)
Re: wifi testing on a Mac 2010-06-23
Robin Wood (robin digininja org)
Re: wifi testing on a Mac 2010-06-21
Christopher A. Jarosz (christopherjarosz att net)
Re: wifi testing on a Mac 2010-06-21
Tiago Rosado (tiagojvrosado gmail com)
karma'd hostapd 2010-05-17
Robin Wood (robin digininja org) (1 replies)
Thanks to some great testing by a few volunteers I'm now releasing the
beta version of my karma'd hostap drivers. This opens Karma up to
ath5k, ath9k and some Prism chipsets along with anything else
supported by hostapd. Currently the only testing has been with ath5k
and ath9k so if anyone can confi

[ more ]  [ reply ]
NDIS6 and Aircrack-NG 2010-06-03
Fatah al Farihin (fathkay yahoo com) (1 replies)
Re: NDIS6 and Aircrack-NG 2010-06-04
Thomas d'Otreppe (tdotreppe gmail com) (1 replies)
Re: NDIS6 and Aircrack-NG 2010-06-05
Joshua Wright (jwright hasborg com)
(Page 4 of 49)  < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus