802.11 Wireless Attacks  Home ToC Prev Up Next 

 802.11
 Attacks
 Conclusion
 +References
  Questions & Answers
  Thanks!
 

References

  • Joshua Wright - Detecting Wireless LAN MAC Address Spoofing

  • Joshua Wright - Layer 2 Analysis of WLAN Discovery Applications for Intrusion Detection

  • abaddon@802.11ninja.net - Advanced 802.11 Attack

  • John Bellardo, Stefan Savaga - 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions

  • Michael Ossman - WEP: Dead Again, Part 1

  • Michael Ossman - WEP: Dead Again, Part 2

  • Robert Moskowitz & Glenn Fleishman - Weakness in Passphrase Choice in WPA Interface


Copyright © 2005 Pavol Lupták, OpenWeekend 2005  Prev Next