Busting The Bluetooth Myth
Author(s): Max Moser
Topic: During the last year, rumours had come to my attention that apparently it is possible to transform a standard 30USD Bluetooth® dongle into a full-blown Bluetooth® sniffer. Thinking you absolutely need Hardware to be able to hop 79 channels 1600 times a second I was rather suspicious about these claims. This paper is the result of my research into this area, answering the question whether it is possible or not.
How to Grab Ressources - a Practical Guide
Author(s): Andreas Naepflin
Topic: This is a small tutorial about Reverse Engineering. This tutorial explains how to manually unpack a UPX-packed executable and manually extract a resource out of it.
Phun with Fortiguard Filters
Author(s): Satya Jith
Topic: Funny issue with Fortiguard Filters and HTTPs
OpenWRT Madness
Author(s): Mati Aharoni
Topic: Getting Metasploit to run on a Linksys Router
Netgear WG511 External Antenna Modification
Author(s): Paul Mansbridge
Topic: Adding an antenna slot to Netgear WG511 PCMCIA cards
Splunk System Logger
Author(s): William M. Hidalgo
Topic: Central logging and anlyzing with Spluk System Logger
Ethereal Wireless Filters
Author(s): William M. Hidalgo
Topic: Ethereal filters for analyzing wireless packets/networks
Kismet Primer Guide
Author(s): William M. Hidalgo
Topic: Quick and dirty shakedown of the Kismet interface and key shortcuts.
802.11b attacks on 802.11g
Author(s): William M. Hidalgo
Topic: Follow up to the aireplay injection
Void11 Rouge Access Point Counter-Offense
Author(s): William M. Hidalgo
Topic: Void11 Rouge Access Point Counter-Offense
WPA Cracking And Kismet/GPS Extras
Author(s): William M. Hidalgo && Paul Mansbridge
Topic: Cowpatty usage and some interesting notes on WPA
WEP Decryption and Physical Intrusion
Author(s): William M. Hidalgo
Topic: Decryption captured packets and physical intrusion
Aireplay injection
Author(s): William M. Hidalgo
Topic: Injection packets into a wireless LAN using aireplay
Author(s): Max Moser
Topic: During the last year, rumours had come to my attention that apparently it is possible to transform a standard 30USD Bluetooth® dongle into a full-blown Bluetooth® sniffer. Thinking you absolutely need Hardware to be able to hop 79 channels 1600 times a second I was rather suspicious about these claims. This paper is the result of my research into this area, answering the question whether it is possible or not.
How to Grab Ressources - a Practical Guide
Author(s): Andreas Naepflin
Topic: This is a small tutorial about Reverse Engineering. This tutorial explains how to manually unpack a UPX-packed executable and manually extract a resource out of it.
Phun with Fortiguard Filters
Author(s): Satya Jith
Topic: Funny issue with Fortiguard Filters and HTTPs
OpenWRT Madness
Author(s): Mati Aharoni
Topic: Getting Metasploit to run on a Linksys Router
Netgear WG511 External Antenna Modification
Author(s): Paul Mansbridge
Topic: Adding an antenna slot to Netgear WG511 PCMCIA cards
Splunk System Logger
Author(s): William M. Hidalgo
Topic: Central logging and anlyzing with Spluk System Logger
Ethereal Wireless Filters
Author(s): William M. Hidalgo
Topic: Ethereal filters for analyzing wireless packets/networks
Kismet Primer Guide
Author(s): William M. Hidalgo
Topic: Quick and dirty shakedown of the Kismet interface and key shortcuts.
802.11b attacks on 802.11g
Author(s): William M. Hidalgo
Topic: Follow up to the aireplay injection
Void11 Rouge Access Point Counter-Offense
Author(s): William M. Hidalgo
Topic: Void11 Rouge Access Point Counter-Offense
WPA Cracking And Kismet/GPS Extras
Author(s): William M. Hidalgo && Paul Mansbridge
Topic: Cowpatty usage and some interesting notes on WPA
WEP Decryption and Physical Intrusion
Author(s): William M. Hidalgo
Topic: Decryption captured packets and physical intrusion
Aireplay injection
Author(s): William M. Hidalgo
Topic: Injection packets into a wireless LAN using aireplay
Comments