Warning: Use of undefined constant add_shortcode - assumed 'add_shortcode' (this will throw an Error in a future version of PHP) in /nfs/c03/h04/mnt/49321/domains/hackingtheuniverse.com/html/wp-content/plugins/stray-quotes/stray_quotes.php on line 615

Warning: Use of undefined constant MSW_WPFM_FILE - assumed 'MSW_WPFM_FILE' (this will throw an Error in a future version of PHP) in /nfs/c03/h04/mnt/49321/domains/hackingtheuniverse.com/html/wp-content/plugins/wordpress-file-monitor/wordpress-file-monitor.php on line 39
Tag: bluetooth

Archive for bluetooth

You are browsing the archives of bluetooth.

Low Energy Bluetooth Mesh Networks

Bluetooth is a short range wireless standard used to connect devices that are close to each other. Mesh networking allows many devices to connect to each other using multi-path delivery and ad hoc topologies. The new bluetooth mesh standard is expected to apply directly to the area known as “internet of things” (IOT) where it […]

The Bluetooth Dilemma

This article describes how criminals have begun to integrate bluetooth technology into card reader skimmers to make it more effective for them to collect stolen card information. Josh Wright is an expert on bluetooth and wireless security in general and is a Senior Instructor at the SANS Institute, where he authored (and often teaches) the […]

Hacking Exposed – Wireless

The new second edition update to “Hacking Exposed – Wireless” has a companion web site that includes several extended versions of chapters. Hacking Exposed Wireless 2nd Edition – [hackingexposedwireless.com] Online Chapters Wireless is a very complex topic, and some may want to dig even further into the WiFi and Bluetooth specifications while learning more about […]

Hacking Wireless Keyboards

Hacking Wireless Keyboards With Keykeriki – [securitytube.net] KeyKeriki is a hardware + software tool released by Remote Exploit to exploit wireless keyboards. You can download the theory slides from here. The details about the software and hardware requirements is available on their website. According to them: “Now 1.5 years after releasing our whitepaper “27Mhz Wireless […]

Wireless Restrictions

AC-18 WIRELESS RESTRICTIONS (NIST SP 800-53) The organization: (i) establishes usage restrictions and implementation guidance for wireless technologies; and (ii) authorizes, monitors, controls wireless access to the information system. NIST Special Publications 800-48 and 800-97 provide guidance on wireless network security. NIST Special Publication 800-94 provides guidance on wireless intrusion detection and prevention. Overview of […]

Wireless

Wireless

Wireless attacks are constantly changing and so are the defensive techniques used against them. Here are some of the areas involved with different wireless attacks: Recon – most wireless attacks start out with some form of recon. It is usually possible to sniff the wireless packets WEP – this security protocol is no longer safe […]