blog trackingRealtime Web Statistics WiFi Archives - Page 2 of 3 - Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘WiFi’

Exploit of Wi-Fi Protected Setup Flaw Poses Risks for Consumers, Not Enterprises

Many home Wi-Fi networks are at risk thanks to an exploit released over the holidays, but enterprise organizations are generally unaffected by the vulnerability.

View full post on eSecurityPlanet RSS Feed

View full post on National Cyber Security

Reaver version 1.3 Released – Updated Brute Force Attacker against Wifi Protected Setup

reaver 1.3

 

Just today, Tactical Network Solutions has released the updated version of  Reaver which is version 1.3. The new version  “implements the short DH key optimizations described in the original vulnerability release paper, which reduces computation time on the target AP and increases the attack speed.” You can download the latest version here which has  full command line codes and optimizations.

If you want to know how to set it up in your Linux distro please refer to its approved resources in code.google.com which include videos and articles on how to set it up wherein the article I also wrote is featured on the list.

Reaver version 1.3 Released – Updated Brute Force Attacker against Wifi Protected Setup, Blog, attacker, WiFi, Against, UPDATED, Released, version, protected, force, setup, brute, Reaver

Reaver version 1.3 Released – Updated Brute Force Attacker against Wifi Protected Setup, Blog, attacker, WiFi, Against, UPDATED, Released, version, protected, force, setup, brute, Reaver

View full post on ProjectX Blog – Information Security Redefined

View full post on National Cyber Security » Computer Hacking

WiFi, DDoS Vulnerabilities, Cyber-Attacks Lead Week’s Security News

Software security flaws dominated news headlines this week, as security experts discussed the implications of a vulnerability that was found in several Web application frameworks.

View full post on germany cyber attack – Yahoo! News Search Results

View full post on National Cyber Security

Most Wi-Fi routers susceptible to hacking through security feature

Researchers have published a paper showing how a feature implemented in modern Wi-Fi routers intended to make securing them easier, in fact makes them insecure by default.Most Wi-Fi routers susceptible to hacking through security feature, Blog, Security, hacking, through, WiFi, most, routers, susceptible, feature

View full post on Naked Security – Sophos

View full post on National Cyber Security

Setting Up Reaver, the WiFi Protected Setup Attack Tool

Security Experts has discovered that WiFi Protected Setup (WPS) is vulnerable and not secured because if an attacker tries to bruteforce an Access Point(AP) within his range, the attacker may be able to recover the WPA/WPA2 passphrase in 4-10 hours but it also depends on the AP. They also found out that the attack may cause a denial of service attack to the router.

Just today, news have spread that the Tactical Network Solutions have released an Open Source tool that lets you perform an attack on a WPS AP. And so in this article we will try to setup the said tool which is name as Reaver which reminds me of a protoss mobile artillery unit in Starcraft (trolololol).

To download this tool just wget it from this link. (update new version is 1.1):

wget http://reaver-wps.googlecode.com/files/reaver-1.1.tar.gz

Extract the gzip file:

tar zxvf http://reaver-wps.googlecode.com/files/reaver-1.1.tar.gz

Move to the directory for installation:

cd /reaver-1.1/src

./configure

make

make install

In order to start the attack, set the BSID and make sure to enable monitor mode (reaver -i mon0 -b <bsid:here> ). For example:

reaver -i mon0 -b 78:44:76:0E:09:54

Brute force attack against Wifi Protected Setup

Well that should be it. The instructions can also be found in this directory and file : reaver-1.1/docs/README. If you want to read it you may launch gedit or you may cat it.

cat reaver-1.1/docs/README

or

gedit reaver-1.1/docs/README

Security Experts said that there is no patch for this vulnerability yet.

Setting Up Reaver, the WiFi Protected Setup Attack Tool, Blog, attack, WiFi, tool, protected, setting, setup, Reaver

Setting Up Reaver, the WiFi Protected Setup Attack Tool, Blog, attack, WiFi, tool, protected, setting, setup, Reaver

View full post on ProjectX Blog – Information Security Redefined

View full post on National Cyber Security » Computer Hacking

ProtectMyID: Is your WiFi secure? If not, an #identitythief could slip into your network and poach sensitive info. http://t.co/khxRjQHJ #cybersecurity

ProtectMyID: Is your WiFi secure? If not, an #identitythief could slip into your network and poach sensitive info. http://t.co/khxRjQHJ #cybersecurity

View full post on Twitter / ProtectMyID

View full post on National Cyber Security

ProtectMyID: Is your WiFi secure? If not, an #identitythief could slip into your network and poach sensitive info. http://t.co/khxRjQHJ #cybersecurity

ProtectMyID: Is your WiFi secure? If not, an #identitythief could slip into your network and poach sensitive info. http://t.co/khxRjQHJ #cybersecurity

View full post on Twitter / ProtectMyID

View full post on National Cyber Security

SSCC 77 – Thanksgiving patching, SCADA, Google WiFi mapping and Android security

Paul Ducklin joins Chet to talk about this week’s news including giving your friends and family a hand at Thanksgiving, Android security, SCADA hacking and Google’s WiFi mapping opt-out scheme.SSCC 77 – Thanksgiving patching, SCADA, Google WiFi mapping and Android security, Blog, Security, Google, WiFi, Android, SCADA, Thanksgiving, SSCC, patching, mapping

View full post on Naked Security – Sophos

View full post on National Cyber Security

Naming your Wi-Fi network after an FBI surveillance van

According to a media report out of San Antonio, the man recently accused of planning to assassinate a Saudi diplomat in Washington, DC, was not the sharpest tool in the box. However, if neighbour accounts are to be taken at face value, the same could be said of the FBI agents tasked with foiling his alleged plot.

It’s unlikely, however, that those accounts are worth face value.

From a story on MySanAntonio.com: “Neighbours, however, said it had been years since (suspect Manssor) Arbabsiar lived in the stucco house he once shared with his wife on a suburban cul-de-sac. They said it appeared as many as 10 people were living in the house, and lately there had been some signs of suspicious activity: When residents looked for available Wi-Fi networks, names like “FBI Van 1″ would pop up.”

Really now. The idea that the FBI would be so foolish as to choose “FBI Van 1″ for a Wi-Fi SSID landed the story on the front page of Fark, a social-bookmarking site that specialises and delights in skewering the stupid.

But could the FBI really have been that stupid?

Presuming it would be futile to ask the FBI directly, I did a bit of online searching and quickly turned up ample reason to believe that the answer is, “No, not that stupid.”

In fact, the question had also come up as recently as this summer after news reports about an alleged plot to blow up a Tampa, Florida high school included assertions that the FBI had been busted using “FBI_SURVEILLANCE VAN” as an SSID.

No proof materialised, but the stories did elicit many accounts of people doing this sort of thing with their home Wi-Fi … just for kicks. It’s such a common gag, in fact – with so many variations – that “Police Surveillance Van 2″ topped Mashable’s list of favorite Wi-Fi names.

Case closed, right? Do not besmirch the FBI with this accusation any longer.

Well, hold on there a minute, J. Edgar, let’s play devil’s advocate (tongue-in-cheek style): If every wise guy on every block in America thinks it’s funny to display “Surveillance Van” on their Wi-Fi – and if word of the joke has gotten around – wouldn’t doing so offer the perfect cover for a real FBI surveillance van?

Think about that one as you’re pulling back the curtain to take a peek out the window.

Kindle purchase offers 10-year-old a lesson

Recently my 10-year-old daughter Emma, a voracious reader, took delivery of the family’s first Kindle. She’s barely put it down since.

One thing that made this purchase particularly notable in our household is that Emma paid for it herself using money she had accumulated through birthday gifts and the like. She forked over $89, which was not only more than she’d ever spent but also represented a significant portion of her personal wealth (at least that which she’s allowed to access).

An ereader and a rite of passage, all wrapped up into one. What’s not to like?

Well, the very next day I received an email from Amazon with the subject line: “Kindle, now from $79.”

It’s only $10 difference, you say? … Did I mention she’s 10?

I’m still trying to decide whether to tell her or not.

Article source: http://rss.feedsportal.com/c/270/f/3551/s/1986233f/l/0Lfeatures0Btechworld0N0Cpersonal0Etech0C3312980A0Cnaming0Eyour0Ewi0Efi0Enetwork0Eafter0Ean0Efbi0Esurveillance0Evan0C0Dolo0Frss/story01.htm

View full post on National Cyber Security » Computer Hacking

iPad 3G delivered, Unboxing and compare with wifi version.mp4


if u dont know wat to do read all if u know wat to do here are links for u: Download Link Pwnagetool 3.1.5: bit.ly SnowBreeze V1.5 can be used to * Jailbreak iPhone 3GS (old bootrom, non-MC) * Jailbreak iPhone 3G * Jailbreak iPhone 2G * jailbreak iPod Touch 2G (old bootrom, non-MC) * Jailbreak iPod Touch 1G Currently, Pwnagetool 3.1.5 is only available for Mac and can jailbreak * iPhone 3G/3GS/2G 3.1.3 Firmware and iPod Touch 1G/2G 3.1.3 OS. Jailbreak iPhone 3G 3GS 3.1.3 with Sn0wbreeze Download Link Snow Breeze v1.3: bit.ly Download Link Wndows .Net 3: bit.ly Download Link Itunes Setup: bit.ly How TO DOwnload : Just Put SOme Fake Infos. Fill The Surveys and u can Download Instructions: Step 1: Download and install the latest version of iTunes. Step 2: Now start iTunes and sync your iPhone with your PC so that it backs-up all your important data including settings, apps, music, contacts and photos. Step 3: Download Sn0wbreeze and the original iPhone OS 3.1.3 for your version of iPhone (download links given below). Move all these files to your desktop. Step 4: Start Sn0wbreeze and select Simple Mode. Step 5: Sn0wbreeze will now ask you to browse for your .ipsw file. Select the correct 3.1.3 firmware .ipsw file by clicking the Browse button. Sn0wbreeze will verify the selected file and then will present you with following screen. Step 6: Click on “Yes” when Sn0wbreeze asks you Do you want to activate your iPhone? for hacktivation. Click on No only if you are on an

View full post on National Cyber Security

Gregory Evans | LinkedIn

Interview With Gregory Evans

Gregory Evans Security Expert

Gregory Evans on Cyber Crime

Page 2 of 3«123»

Get The New Book By Gregory Evans

Everyone Is Talking About!

Are You Hacker Proof?
$15.95

Find Out More, Click Here!