Coder Social home page Coder Social logo

awesome-wifi-security's Introduction

awesome-wifi-security

A collection of (not-so, yet) awesome resources related to 802.11 security, tools and other things

Table of Contents

TKIP Security

Practical attacks against WEP and WPA (2008)

An Improved Attack on TKIP (2009)

Cryptanalysis of IEEE 802.11i TKIP

Enhanced TKIP Michael Attacks (2010)

Plaintext Recovery Attacks Against WPA/TKIP (2013)

Practical verification of WPA-TKIP vulnerabilities (2013)

On the security of RC4 in TLS (USENIX, 2013)

All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS (USENIX, 2015)

A Security Analysis of the WPA-TKIP and TLS Security Protocols (PhD Thesis, 2016)

Predicting and Abusing WPA2/802.11 Group Keys (2016)

WiFi Protected Setup (WPS)

Papers

Brute forcing Wi-Fi Protected Setup (2011)

An Investigation into the Wi-Fi Protected Setup PIN of the Linksys WRT160N v2 (2012)

Offline bruteforce attack on wifi protected setup (Pixie dust attack, 2014)

Tools

Pixiewps: An offline WPS bruteforce utility

Reaver-wps-fork-t6x: community edition of Reaver (which includes the Pixie Dust attack)

Bully: new implementation of the WPS brute force attack, written in C.

Online Cracking Services for PSK

WPA-Enterprise

Eduroam

MITM Attack Model against eduroam (2013)

A Practical Investigation of Identity Theft Vulnerabilities in Eduroam (2015)

Server Certificate Practices in Eduroam (2015): Best practice document

Evil Twin Vulnerabilities in Wi-Fi Networks (Bachelor Thesis, 2016)

eduroam FreeRADIUS Docker

Authentication protocols that DO support hashed passwords (FreeRADIUS mailing list)

EAP-PWD: Extensible Authentication Protocol (EAP) Authentication Using Only a Password

Attacks

KARMA

Attacking automatic Wireless network selection (2005)

Why do Wi-Fi Clientes disclose their PNL for Free Still Today? (2015)

Instant KARMA might still gets you (2015)

Evil Twin

Infernal twin

Evil Twin vulnerabilities in Wi-Fi networks (Master Thesis, 2016)

Wireless Routers

Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers (WOOT, 2015) Keyspace List for WPA on Default Routers

Rogue AP

Documentation

Manna from heaven: Improving the state of rogue AP attacks (2015):

Tools

hostapd-mana: hostapd with the attacks described in Defcon 22, and with the ability to rogue EAP access points.

Privacy

Tracking

Tracking unmodified smartphones using Wi-Fi monitors (2012)

Show me your SSIDs; I will show who you are (2012)

Signals from the Crowd: Uncovering Social Relationships through Smartphone Probe (2013, SIGCOM)

I know who you will meet this evening! Linking wireless devices using Wi-Fi probe requests (2012)

Is Your Android Device Telling the World Where You've Been? (2014)

How talkative is your mobile device?: an experimental study of Wi-Fi probe requests (2015)

MAC Adress Randomization

Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms (2016)

A Study of MAC Address Randomization in Mobile Devices and When it Fails (2017)

awesome-wifi-security's People

Contributors

edelahozuah avatar

Watchers

 avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.