Warning: Use of undefined constant add_shortcode - assumed 'add_shortcode' (this will throw an Error in a future version of PHP) in /nfs/c03/h04/mnt/49321/domains/hackingtheuniverse.com/html/wp-content/plugins/stray-quotes/stray_quotes.php on line 615

Warning: Use of undefined constant MSW_WPFM_FILE - assumed 'MSW_WPFM_FILE' (this will throw an Error in a future version of PHP) in /nfs/c03/h04/mnt/49321/domains/hackingtheuniverse.com/html/wp-content/plugins/wordpress-file-monitor/wordpress-file-monitor.php on line 39
Tag: 802.11

Archive for 802.11

You are browsing the archives of 802.11.

Hacking Exposed – Wireless

The new second edition update to “Hacking Exposed – Wireless” has a companion web site that includes several extended versions of chapters. Hacking Exposed Wireless 2nd Edition – [hackingexposedwireless.com] Online Chapters Wireless is a very complex topic, and some may want to dig even further into the WiFi and Bluetooth specifications while learning more about […]


Kismet is a powerful wireless sniffer that offers excellent passive reconnaissance of wireless networks. It requires a wireless card that supports rfmon (monitor) mode and runs on linux. It is available as a standalone application and is also found on the Backtrack CD compilation. Kismet – [kismetwireless.net] What is Kismet? Kismet is an 802.11 layer2 […]

Wireless Restrictions

AC-18 WIRELESS RESTRICTIONS (NIST SP 800-53) The organization: (i) establishes usage restrictions and implementation guidance for wireless technologies; and (ii) authorizes, monitors, controls wireless access to the information system. NIST Special Publications 800-48 and 800-97 provide guidance on wireless network security. NIST Special Publication 800-94 provides guidance on wireless intrusion detection and prevention. Overview of […]



Wireless attacks are constantly changing and so are the defensive techniques used against them. Here are some of the areas involved with different wireless attacks: Recon – most wireless attacks start out with some form of recon. It is usually possible to sniff the wireless packets WEP – this security protocol is no longer safe […]