Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-wifi-security
A collection of awesome resources related to 802.11 security, tools and other things
https://github.com/edelahozuah/awesome-wifi-security
Last synced: 3 days ago
JSON representation
-
Table of Contents
-
TKIP Security
- Practical attacks against WEP and WPA (2008)
- Cryptanalysis of IEEE 802.11i TKIP
- Enhanced TKIP Michael Attacks (2010)
- Plaintext Recovery Attacks Against WPA/TKIP (2013)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- On the security of RC4 in TLS (USENIX, 2013)
- All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS (USENIX, 2015)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Predicting and Abusing WPA2/802.11 Group Keys (2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- An Improved Attack on TKIP (2009)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
- Practical verification of WPA-TKIP vulnerabilities (2013)
- A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)
-
WiFi Protected Setup (WPS)
- Brute forcing Wi-Fi Protected Setup (2011)
- An Investigation into the Wi-Fi Protected Setup PIN of the Linksys WRT160N v2 (2012)
- Offline bruteforce attack on wifi protected setup (*Pixie dust attack*, 2014)
- An Investigation into the Wi-Fi Protected Setup PIN of the Linksys WRT160N v2 (2012)
- An Investigation into the Wi-Fi Protected Setup PIN of the Linksys WRT160N v2 (2012)
-
Online Cracking Services for PSK
- Crackq - accelerated password cracker designed to help penetration testers and network auditors identify weak passwords
- http://www.onlinehashcrack.com/
- http://wpa.darkircop.org/
- https://www.gpuhash.me/
- https://hashcrack.org/
- Database of vulnerable Wi-Fi Network: router-db.com
- http://wpa.darkircop.org/
- http://wpa.darkircop.org/
- http://wpa.darkircop.org/
- http://wpa.darkircop.org/
- http://wpa.darkircop.org/
- http://wpa.darkircop.org/
- http://wpa.darkircop.org/
- http://wpa.darkircop.org/
- http://wpa.darkircop.org/
- http://wpa.darkircop.org/
- http://wpa.darkircop.org/
- http://wpa.darkircop.org/
- http://wpa.darkircop.org/
-
WPA-Enterprise
- MITM Attack Model against eduroam (2013)
- A Practical Investigation of Identity Theft Vulnerabilities in Eduroam (2015)
- Server Certificate Practices in Eduroam (2015)
- Authentication protocols that DO support hashed passwords (FreeRADIUS mailing list)
- EAP-PWD: Extensible Authentication Protocol (EAP) Authentication Using Only a Password
-
Attacks
-
Wireless Routers
-
Rogue AP
-
Privacy
- Tracking unmodified smartphones using Wi-Fi monitors (2012)
- Show me your SSIDs; I will show who you are (2012)
- Signals from the Crowd: Uncovering Social Relationships through Smartphone Probe (2013, SIGCOM)
- I know who you will meet this evening! Linking wireless devices using Wi-Fi probe requests (2012)
- Is Your Android Device Telling the World Where You've Been? (2014)
- Paper
- Slides
- Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms (2016)
- A Study of MAC Address Randomization in Mobile Devices and When it Fails (2017)
- A Study of MAC Address Randomization in Mobile Devices and When it Fails (2017)
-
WPA3
-