«
Expand/Collapse
100 items tagged "wifi"
Related tags:
Newbie [+],
Area [+],
arduino [+],
video [+],
security [+],
chaos communication congress [+],
authors [+],
Support [+],
wpa [+],
wifi card [+],
usb [+],
luiz eduardo tags [+],
hacking [+],
wi fi [+],
slides [+],
shot [+],
router [+],
read [+],
raspberry [+],
radio [+],
power [+],
mesh [+],
link [+],
google [+],
gain antennas [+],
fresnel zone [+],
feet [+],
elektra wagenrad [+],
electromagnetic waves [+],
darknet [+],
communication [+],
card [+],
aircrack [+],
aggregation techniques [+],
access [+],
Hardware [+],
General [+],
hacks [+],
vulnerability [+],
tp link [+],
seattle wireless [+],
seattle [+],
saludos [+],
robot [+],
realtek [+],
question [+],
networks [+],
network [+],
nbsp [+],
mode [+],
microcontrollers [+],
materiel [+],
legal [+],
led [+],
ken caruso [+],
johnny cache [+],
jay [+],
green [+],
gerix [+],
email [+],
e book [+],
dongle [+],
digital [+],
debutant [+],
david hulton [+],
chris hurley tags [+],
chris hurley [+],
charging station [+],
cellphones [+],
caruso [+],
bssid [+],
bridge [+],
breaking [+],
black hat [+],
audio [+],
anybody [+],
Supporto [+],
NON [+],
Issues [+],
Espace [+],
Angolo [+],
zigbee [+],
wpa2 [+],
wpa wpa2 [+],
wpa supplicant [+],
worldwide [+],
wlan [+],
wireless security [+],
wireless opportunity [+],
wireless access point [+],
wind turbine [+],
wifi repeater [+],
wifi cantenna [+],
wicd [+],
wes [+],
wep wpa [+],
wep key [+],
wep [+],
web interface [+],
way [+],
watt [+],
wardriving [+],
wardrive [+],
vmware [+],
viewfinder [+],
video presentation [+],
vancouver [+],
usb tv tuner [+],
usb hub [+],
usa [+],
us army surplus [+],
university grad [+],
university college london [+],
unforgiving terrain [+],
undiscovered territory [+],
una [+],
tweets [+],
tunes [+],
triad [+],
trax [+],
travis goodspeed [+],
travis brown [+],
traffic signal controller [+],
traffic light controller [+],
traffic [+],
toy [+],
time don [+],
ti 84 graphing calculator [+],
thumb drive [+],
three dollars [+],
thanks in advance [+],
testing [+],
tesla coils [+],
tcp connection [+],
tcp and udp [+],
target drone [+],
tank [+],
tactical [+],
system [+],
swiss army knife [+],
surveillance system [+],
style [+],
stupid [+],
streaming audio [+],
stolen photo [+],
still image [+],
stick [+],
stefan viehbc [+],
station [+],
standalone hardware [+],
stan brooks [+],
sprint version [+],
sprint [+],
space [+],
sono [+],
solarpump [+],
solar panel [+],
solar [+],
snarfing [+],
smart phone [+],
slouch [+],
sim card [+],
sim [+],
shield [+],
shawn tsetsilas [+],
setup [+],
sensor readings [+],
sensor module [+],
sensor [+],
security protocol [+],
scheda [+],
scavenger hunt [+],
salut [+],
ryan guerra [+],
ryan [+],
rock [+],
rochester institute of technology [+],
robots [+],
rifle [+],
richard [+],
retrofitted [+],
retro radio [+],
rete [+],
replay attack [+],
repeater [+],
relative brightness [+],
reconnaissance [+],
real mode [+],
radio hack [+],
radio board [+],
radiation sensor [+],
radiation [+],
radar systems [+],
radar [+],
race [+],
quinn dunki [+],
quadcopter [+],
prototyping capabilities [+],
protected [+],
propia [+],
proof of concept [+],
problem [+],
pringles [+],
presentation [+],
pre [+],
pound [+],
portable [+],
point [+],
plz [+],
place [+],
pixi [+],
pitch forks [+],
picture [+],
picatinny rails [+],
perry correll [+],
performance gap [+],
patience [+],
passwords [+],
password list [+],
passive radar [+],
passersby [+],
parabolic antenna [+],
panel [+],
palatial estate [+],
p.s. vboxguestadditions [+],
p.s [+],
owen [+],
opinion [+],
openwrt [+],
nxt [+],
nikon [+],
nick [+],
news [+],
networking [+],
nbsp nbsp nbsp nbsp nbsp [+],
n draft [+],
modprobe [+],
mishap [+],
misc [+],
milliwatt [+],
mile [+],
mike worth [+],
michael helms [+],
miami [+],
mia [+],
matrix display [+],
matrix [+],
mapped [+],
macbook [+],
mac [+],
london [+],
logger [+],
listening to music [+],
linux [+],
light painting [+],
lego nxt [+],
lego [+],
larry [+],
laptop [+],
la fonera [+],
knut [+],
kinks [+],
kickstarter [+],
key [+],
kevin bong [+],
kanotix [+],
joe fitz [+],
jay collett [+],
jan [+],
james [+],
ipw [+],
internet signal [+],
internet radio stations [+],
internet [+],
internal gps [+],
internal antennas [+],
interface [+],
interfaccie [+],
intel pro wireless 3945 abg [+],
intel pro wireless 3945 [+],
intel pro wireless 2200 [+],
intel pro [+],
intel [+],
init [+],
identifying [+],
howtos [+],
houston resident [+],
houston [+],
hotspot [+],
hotmail [+],
host files [+],
home [+],
holland [+],
hire [+],
hex editor [+],
heart of the matter [+],
harvest [+],
half [+],
hacker un pc [+],
hack [+],
gun turret [+],
gun [+],
gsm to skype [+],
graphical mode [+],
grad student [+],
gps position [+],
germany [+],
geiger muller tube [+],
geeks [+],
g mini [+],
g laptop [+],
free geek [+],
france [+],
frame [+],
fly helicopter [+],
fli [+],
eye [+],
external antennas [+],
exact model [+],
event [+],
est [+],
enterprise [+],
englisch [+],
encender [+],
elliot [+],
echo [+],
dutch court [+],
dutch [+],
drone aircraft [+],
drone [+],
don [+],
directional pad [+],
digital picture frame [+],
dexter [+],
deauthentication [+],
dd wrt [+],
data logger [+],
data [+],
dan landers [+],
d link [+],
court [+],
copter [+],
controller [+],
control scheme [+],
control [+],
cons [+],
connection [+],
compaq [+],
commodity hardware [+],
coil gun [+],
coil [+],
coffee shops [+],
cigar box [+],
church [+],
chris farnell [+],
chipset [+],
chink in the armor [+],
chiave [+],
che [+],
ch10 [+],
ces [+],
centerpiece [+],
cellphone [+],
carte usb [+],
carte [+],
cantenna [+],
cameras [+],
calculator [+],
buffer space [+],
bt4 [+],
bt3 [+],
brute force [+],
broadcom [+],
britain [+],
brian blankership [+],
boot screen [+],
bonjour [+],
bluetooth sniffer [+],
bluetooth module [+],
bluetooth [+],
bercu [+],
belgium [+],
bay area [+],
basics [+],
bamf [+],
authentication [+],
australian privacy commissioner [+],
australian [+],
australia [+],
attiny [+],
atheros [+],
asia [+],
arduino bot [+],
aquariums [+],
anyone [+],
antennas [+],
android [+],
alpha [+],
alfa [+],
airodump [+],
airo [+],
aerohive [+],
aerial [+],
adir [+],
adapter [+],
adam conway [+],
adam bercu [+],
acer [+],
access points [+],
access point [+],
aca [+],
abstract presentation [+],
Tutoriaux [+],
Tutoriales [+],
Soporte [+],
Software [+],
Rasberry [+],
Idiots [+],
Guias [+],
Final [+],
Corner [+],
4ghz [+],
30k [+],
Wireless [+],
BackTrack [+]
-
-
7:01
»
Hack a Day
[Manish] packed lots of functionality into this radiation sensor module. The device is completely solar powered and weatherproof, so it can be mounted anywhere. It uses a Geiger Muller tube to monitor radiation and connects to the internet using wifi network to report the readings. The design uses an Arduino Pro Mini to perform the [...]
-
-
13:31
»
Hack a Day
So the Raspberry Pi sometimes doesn’t have the juice needed to run power-hungry USB dongles. The most common issue is with WiFi adapters. The solution has long been to use a powered USB hub, but [Mike Worth] didn’t want to take up that much extra space. The solution he worked out injects power directly into [...]
-
-
7:29
»
Hack a Day
While wandering around the aisles of his local electronics store this Westinghouse USB charging station caught [James'] eye. He sized it up and realized it would make the perfect enclosure for a small WiFi router. And so began his project to turn a TP-Link TL-WR703N into a DIY Pwn Plug. The basic idea is to include [...]
-
-
4:01
»
Hack a Day
Here’s a pretty tricky piece of consumer electronics reverse engineering. [Joe Fitz] came across the Nikon WU-1a. It’s a dongle that plugs into a Nikon D3200 camera, producing a WiFi connection which can be picked up and controlled from a smart phone. The app shows you the current image from the viewfinder, allows you to [...]
-
-
6:00
»
Carnal0wnage
I needed to make a map the access points for a client. Since i cant show that map, i made another using the same technique.
First take your handy dandy Android device and install
Wigle Wifi Wardriving.
It uses the internal GPS and wifi to log access points, their security level and their GPS Position.
looks like this (yup i stole these)

List of access points

Also makes a cute map on your phone
once you have the APs you can export out the "run" from the data section. yes yes, the stolen photo says "settings" but if you install it today it will say "data" there now.

With the KML export you can import that directly into google earth and make all sorts of neat maps by toggling the data.

All Access Points

Open Access Points

WEP Encrypted Access Points
That's it.
-CG
-
-
16:01
»
Hack a Day
[Adam Bercu] and [Dan Landers] from Artisan’s Asylum in Somerville, MA brought a very, very cool toy to Maker Faire this year. It’s a two hundred pound WiFi repeater deploying robot able to amble across unforgiving terrain and my foot. The robot is controlled through a web interface with the help of a front-mounted web cam [...]
-
-
21:52
»
SecDocs
Authors:
Elektra Wagenrad Tags:
WiFi Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: What you need to know to successfully design and build a wifi long shot. RF Calculation. Knowledge about the Fresnel Zone. Polarisation of electromagnetic waves. Tricks to avoid interference. Timeout problems of 802.11abg and how to deal with them. What you need to know to successfully design and build a wifi long shot. RF Calculation. Knowledge about the Fresnel Zone. Polarisation of electromagnetic waves. Tricks to avoid interference. Timeout problems of 802.11abg and how to deal with them. Slightly more comprehensive description: Wifi is a really inexpensive way to build datalinks up to 120 kilometer distance. Such use of Wifi is already relatively widespread in developing countries that lack communication infrastructure. The world wide web is so far not truly for everyone - may 1 billion people use it and about 5 billions don't. It maybe unavailable, too expensive or both. Indeed, Information needs to be free - that also means that there must be cheap ways to share it. So far WiFi is the cheap way to go where no infrastructure exists - although that may change with WiMax in the future. Even if you live in a developed country it is fun or may be necessary to build your own (community) network beyond the range a few hundred meters.
-
21:52
»
SecDocs
Authors:
Elektra Wagenrad Tags:
WiFi Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: What you need to know to successfully design and build a wifi long shot. RF Calculation. Knowledge about the Fresnel Zone. Polarisation of electromagnetic waves. Tricks to avoid interference. Timeout problems of 802.11abg and how to deal with them. What you need to know to successfully design and build a wifi long shot. RF Calculation. Knowledge about the Fresnel Zone. Polarisation of electromagnetic waves. Tricks to avoid interference. Timeout problems of 802.11abg and how to deal with them. Slightly more comprehensive description: Wifi is a really inexpensive way to build datalinks up to 120 kilometer distance. Such use of Wifi is already relatively widespread in developing countries that lack communication infrastructure. The world wide web is so far not truly for everyone - may 1 billion people use it and about 5 billions don't. It maybe unavailable, too expensive or both. Indeed, Information needs to be free - that also means that there must be cheap ways to share it. So far WiFi is the cheap way to go where no infrastructure exists - although that may change with WiMax in the future. Even if you live in a developed country it is fun or may be necessary to build your own (community) network beyond the range a few hundred meters.
-
21:52
»
SecDocs
Authors:
Elektra Wagenrad Tags:
WiFi Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: What you need to know to successfully design and build a wifi long shot. RF Calculation. Knowledge about the Fresnel Zone. Polarisation of electromagnetic waves. Tricks to avoid interference. Timeout problems of 802.11abg and how to deal with them. What you need to know to successfully design and build a wifi long shot. RF Calculation. Knowledge about the Fresnel Zone. Polarisation of electromagnetic waves. Tricks to avoid interference. Timeout problems of 802.11abg and how to deal with them. Slightly more comprehensive description: Wifi is a really inexpensive way to build datalinks up to 120 kilometer distance. Such use of Wifi is already relatively widespread in developing countries that lack communication infrastructure. The world wide web is so far not truly for everyone - may 1 billion people use it and about 5 billions don't. It maybe unavailable, too expensive or both. Indeed, Information needs to be free - that also means that there must be cheap ways to share it. So far WiFi is the cheap way to go where no infrastructure exists - although that may change with WiMax in the future. Even if you live in a developed country it is fun or may be necessary to build your own (community) network beyond the range a few hundred meters.
-
-
11:01
»
Hack a Day
The WiFi adapter in your laptop has a special mode – monitor mode – that can be used to listen in on WiFi traffic and, with a little patience, can be used to crack a WEP password. Surprisingly, this monitor mode can’t be found on any Android device due in part to the limitations of [...]
-
-
9:01
»
Hack a Day
For his most ambitious build to date, [Param] thought it would be a cool idea to have a LED matrix display spitting tweets out via a WiFi connection. The build is now done, and we’ve got to hand it to him for a very nice build. The build is based on an Arduino with a [...]
-
-
12:30
»
Hack a Day
Over on the Arduino blog, the release of the official Arduino WiFi shield was just announced. On the spec page for this WiFi shield. we can see this new board isn’t a slouch; it’s powered by a 32-bit ATMega 32UC3 microcontroller, has provisions for WEP and WPA2 encryption, and supports both TCP and UDP with [...]
-
-
21:45
»
SecDocs
Authors:
Achim Friedland Tags:
WiFi Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Most of today's long-range wireless mesh or point-to-point links suffer from a high overhead during channel access, frequent link failtures and the lack of taking a real advantage of the mesh network structure. This leads to a really bad performance for TCP-like traffic compared to UDP traffic over this links. We want to present your two different ideas for optimizing throughput and delay without breaking any wifi-standard (or at least not too much ;). Most of today's wireless mesh networks can be characterised by the use of cheap half-duplex transmission technologies like IEEE 802.11. It suffers from a high overhead during channel access, frequent link failures and the lack of taking a real advantage of the mesh network structure. All this may result in low throughput and high end-to-end delay. To improve both properties, one may use diversity achieved through multiple channels directional high gain antennas, polarization multiplex and frame aggregation techniques. Additionally -- in order to take an advantage of the mesh network structure -- it is possible to divide the up- and downstream of a wifi point-to-point link into two seperate links. This eliminates the concurrency between both directions. Results of calculations, simulations and measurements show an improved distribution of delay and a significant higher throughput especially for TCP-like applications. Both values can furthermore be improved by an optimization of the IEEE 802.11e quality-of-service parameters.
-
-
21:43
»
SecDocs
Authors:
Achim Friedland Tags:
WiFi Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Most of today's long-range wireless mesh or point-to-point links suffer from a high overhead during channel access, frequent link failtures and the lack of taking a real advantage of the mesh network structure. This leads to a really bad performance for TCP-like traffic compared to UDP traffic over this links. We want to present your two different ideas for optimizing throughput and delay without breaking any wifi-standard (or at least not too much ;). Most of today's wireless mesh networks can be characterised by the use of cheap half-duplex transmission technologies like IEEE 802.11. It suffers from a high overhead during channel access, frequent link failures and the lack of taking a real advantage of the mesh network structure. All this may result in low throughput and high end-to-end delay. To improve both properties, one may use diversity achieved through multiple channels directional high gain antennas, polarization multiplex and frame aggregation techniques. Additionally -- in order to take an advantage of the mesh network structure -- it is possible to divide the up- and downstream of a wifi point-to-point link into two seperate links. This eliminates the concurrency between both directions. Results of calculations, simulations and measurements show an improved distribution of delay and a significant higher throughput especially for TCP-like applications. Both values can furthermore be improved by an optimization of the IEEE 802.11e quality-of-service parameters.
-
21:43
»
SecDocs
Authors:
Achim Friedland Tags:
WiFi Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Most of today's long-range wireless mesh or point-to-point links suffer from a high overhead during channel access, frequent link failtures and the lack of taking a real advantage of the mesh network structure. This leads to a really bad performance for TCP-like traffic compared to UDP traffic over this links. We want to present your two different ideas for optimizing throughput and delay without breaking any wifi-standard (or at least not too much ;). Most of today's wireless mesh networks can be characterised by the use of cheap half-duplex transmission technologies like IEEE 802.11. It suffers from a high overhead during channel access, frequent link failures and the lack of taking a real advantage of the mesh network structure. All this may result in low throughput and high end-to-end delay. To improve both properties, one may use diversity achieved through multiple channels directional high gain antennas, polarization multiplex and frame aggregation techniques. Additionally -- in order to take an advantage of the mesh network structure -- it is possible to divide the up- and downstream of a wifi point-to-point link into two seperate links. This eliminates the concurrency between both directions. Results of calculations, simulations and measurements show an improved distribution of delay and a significant higher throughput especially for TCP-like applications. Both values can furthermore be improved by an optimization of the IEEE 802.11e quality-of-service parameters.
-
-
8:01
»
Hack a Day
What happens when you combine a TI-84+ graphing calculator with an added bluetooth module, a 1 Watt Alfa wifi dongle, and a Parrot Wifi Quadcopter? You get a long range quadcopter that’s controlled from the TI-84+ directional pad. This TI-84+ looks like a standard issue school calculator, but [Owen] added an ATTiny13 microcontroller and a [...]
-
-
10:01
»
Hack a Day
Turns out you don’t need to be Superman to see through walls. Researchers at University College London have developed a way to passively use WiFi as a radar system. Unlike active radar systems (which themselves send out radio waves and listen for them to echo back), passive radar systems cannot be detected. The system is [...]
-
-
12:01
»
Hack a Day
This remote control tank now takes its orders from a Raspberry Pi board. Well, actually it’s taking orders from commands pushed to the RPi board via SSH. The control scheme works out quite well. Using a low-profile WiFi dongle the RPi automatically connects to the wireless network when it is powered on. This makes it [...]
-
-
14:01
»
Hack a Day
[Richard] and [Jay] needed a WiFi connected data logger for remotely monitored aquariums. After working diligently for three years, they’re finally finished. While the Knut was originally designed to keep tabs on a few huge aquariums, it’s more than capable to log all sorts of data and send those sensor readings to your email address. Knut [...]
-
-
15:01
»
Hack a Day
If you’re expecting the serfs to hop the fence with pitch forks and torches you may want to employ a surveillance system. WiFi cameras are a cheap way of doing this, but you’ll need power. [CheapGuitar] decided not to run extension cords, and instead added solar power to his wireless camera. The solar panels are easy to [...]
-
14:01
»
Hack a Day
[Travis Brown] just published a post about the traffic light controller he built. His number one goal was to make the device wireless (except for AC power) and he achieved this by using a WiFi shield for his Arduino. But there is also a separate board that provides a way for the chip to switch [...]
-
-
9:01
»
Hack a Day
Whether it’s building a 3D scanning system with a Kinect, or using a USB TV tuner dongle for software defined radio, there are a lot of interesting off-schedule uses for commodity hardware. The latest comes from the fruitful mind of [sjMoquin] and a Lexmark N2050 WiFi card that runs Linux. This build started off with a Lexmark X6570 [...]
-
-
7:01
»
Hack a Day
[Nick] was somewhat disappointed when the Wi-Fly helicopter he bought his son broke in less than 10 minutes. The main gear that turns the rotor split in half, rendering the copter WiFi enabled trash. [Nick] however decided that he didn’t want to waste an opportunity and harvested the receiver parts. To test them out, he [...]
-
-
14:16
»
Hack a Day
Wardriving started out as a search for unprotected WiFi access points before hot spots were prevalent. And so this ZigBee protocol wardriving hardware which [Travis Goodspeed] put together really gives us a sense of nostalgia for that time. Don’t get us wrong, we love our pervasive WiFi access and don’t wish to go back to simpler [...]
-
-
12:01
»
Hack a Day
[Quinn Dunki] got some free stuff from Element14 to evaluate, including this Mircrochip WiFi module. It’s been used as the centerpiece of an Arduino shield in the past, and she grabbed a copy of that library to see if it would play nicely with an ATtiny chip. What follows is a struggle to de-Arduino the [...]
-
-
13:56
»
Hack a Day
Twenty three dollars. That’s all this tiny pen-testing device will set you back. And there really isn’t much to it. [Kevin Bong] came up with the idea to use a Wifi router as a bridge to test a wired network’s security remotely. He grabbed a TP-Link TL-WR703N router, a low-profile thumb drive, and a cellphone backup [...]
-
-
12:01
»
Hack a Day
Looks like your WiFi might not be quite as secure as you thought it was. A paper recently published by [Stefan Viehböck] details a security flaw in the supposedly robust WPA/WPA2 WiFi security protocol. It’s not actually that protocol which is the culprit, but an in-built feature called Wi-Fi Protected Setup. This is an additional [...]
-
-
12:01
»
Hack a Day
The folks at Dexter Industries have just wrapped up a week of Lego NXT projects, most of which centered on the use of their NXT WiFi sensor. Developed over the last few months, the group has been hard at work refining their design and getting some of the kinks worked out, so now you too [...]
-
-
15:01
»
Hack a Day
[Elliot] put together an intriguing proof-of-concept script that uses repeated deauthentication packet bursts to jam WiFi access points. From what we can tell it’s a new way to use an old tool. Aircrack-ng is a package often seen in WiFi hacking. It includes a deauthentication command which causes WiFi clients to stop using an access [...]
-
-
8:01
»
Hack a Day
[Jay Collett] likes listening to Internet radio stations and decided to build his own standalone hardware that lets him listen without being at his computer. But he wasn’t starting from square one on this project. [Jay] built on the epic instruction set that [Mighty Ohm] published when he first built his own WiFi radio. Both [...]
-
-
4:05
»
Hack a Day
[AUTUIN] sent in a tip for his wifi sniffing digital picture frame. A soon-to-be-trashed Pentium II laptop was rescued from Free Geek Vancouver. A lot of coffee shops around Vancouver feature local art and free wifi, so [AUTUIN] decided to combine the two. The project is designed to hang on the wall of a cafe [...]
-
-
10:10
»
Hack a Day
What do you do when you can’t afford broadband and no-cost WiFi is just out of reach? That was the problem Rice University grad student [Ryan Guerra] was tasked with solving. A local Houston resident could barely tap into the free service offered in her area, so [Ryan] set out to extend the signal’s range [...]
-
-
13:15
»
Hack a Day
Here’s the scenario: you’re going to be traveling somewhere and you’ll be charged roaming fees if you use your cellphone. But there is free WiFi available in this place. You can save yourself money by leaving your SIM card at home and using a GSM-to-Skype bridge to take calls on your phone via WiFi. [Trax] [...]
-
-
4:03
»
Hack a Day
[Wes] built a cool looking Tactical Wifi Cantenna with some parts from a broken airsoft pistol. The antenna is a cookie can type with an added cone to increase performance, as seen in this tutorial. Once the antenna was built it was time to add some kind of handle, [Wes] just so happened to have [...]
-
-
8:00
»
Hack a Day
Instructables user [Jan] likes listening to music while hacking away in his workshop, but listening to the same CDs gets tired and boring after awhile. He contemplated listening to streaming audio over the Internet, but hated the idea of needing a computer around at all times. After a bit of reading, he found some information [...]
-
-
11:46
»
Hack a Day
Here’s an artsy way to map out WiFi networks around you; use a big light pole and long exposures to graph them on top of photographs. This capture method is often called light painting, and uses the relative brightness of LEDs to stretch out a still image – moving the stick quickly while the shutter [...]
-
-
14:14
»
Wirevolution
I will be moderating this panel at IT Expo in Miami on February 2nd at 12:00 pm:
Mobility is taking the enterprise space by storm – everyone is toting a smartphone, tablet, laptop, or one of each. It’s all about what device happens to be the most convenient at the time and the theory behind unified communications – anytime, anywhere, any device. The adoption of mobile devices in the home and their relevance in the business space has helped drive a new standard for enterprise networking, which is rapidly becoming a wireless opportunity, offering not only the convenience and flexibility of in-building mobility, but WiFi networks are much easier and cost effective to deploy than Ethernet. Furthermore, the latest wireless standards largely eliminate the traditional performance gap between wired and wireless and, when properly deployed, WiFi networks are at least as secure as wired. This session will discuss the latest trends in enterprise wireless, the secrets to successful deployments, as well as how to make to most of your existing infrastructure while moving forward with your WiFi installation.
The panelists are:
- Shawn Tsetsilas, Director, WLAN, Cellular Specialties, Inc.
- Perry Correll, Principal Technologists, Xirrus Inc.
- Adam Conway, Vice President of Product Management, Aerohive
Cellular Specialties in this context is a system integrator, and one of their partners is Aerohive. Aerohive’s special claim to fame is that they eliminate the WLAN controller, so each access point controls itself in cooperation with its neighbors. The only remaining centralized function is the management. Aerohive claims that this architecture gives them superior scalability, and a lower system cost (since you only pay for the access points, not the controllers).
Xirrus’s product is unusual in a different way, packing a dozen access points into a single sectorized box, to massively increase the bandwidth available in the coverage areas.
So is it true that Wi-Fi has evolved to the point that you no longer need wired ethernet?
-
-
3:45
»
SecDocs
Tags:
WiFi Event:
PhreakNIC 11 Abstract: Presentation of awards for the Wifi Race and the Scavenger Hunt at PhreakNIC 0x0b.
-
-
1:16
»
SecDocs
Tags:
WiFi Event:
PhreakNIC 11 Abstract: Wireless networks have been around for a few years, however the ways to extend, use and abuse them haven't changed too much. While not a completely new look at things, this presentation will touch on some previously undiscovered territory which should be of interest to any wireless security researcher, as well as discuss a few ideas on unusual uses of antennas and dishes, oddball antennas and just general wi-phun.
-
-
3:17
»
SecDocs
-
-
21:13
»
SecDocs
-
-
7:11
»
SecDocs
-
7:10
»
SecDocs
-
-
1:36
»
remote-exploit & backtrack
Estimados respecto al harware para auditorias wifi cual es segun ustedes la mejor opcion, Chipset Atheros, Intel o Realtek, ahora si pueden indicarme una marca y modelo tambien me sirve, pero es mejor el chipset por k talvez la marca o modelo que ustedes suguieran no la pueda encontrar por aca.
Saludos desde Chile, vamos 33.......
-
-
11:00
»
Hack a Day
For all those times you need to broadcast your own access point where there’s no outlet [Larry] shows us how to make a solar-powered hotspot. He started by slapping a solar panel on the lid of a cigar box and attaching it to five rechargeable AA batteries inside. These power the mainboard from a router which is [...]
-
-
14:00
»
Hack a Day
Feeling bad that his access point was being made fun of by models with beefier external antennas, [Customer Service] decided to do something about it. After cracking open the Asus wl-330ge he found it would be quite easy to add a connector. This access point has two internal antennas that are quite small and use [...]
-
-
11:54
»
Hack a Day
This little robot was built very quickly thanks to the rapid prototyping capabilities of the Arduino. It uses a WiShield 1.0 from AsyncLabs to connect to a wireless network for control via a TCP connection. The body and wheels are wood, with a servo for each motor and a third used to scan a range finder from [...]
-
-
8:51
»
Hack a Day
The WiFi Aerial Surveillance Platform, or WASP for short, is an autonomous drone aircraft that sniffs out WiFi networks. But it packs a much larger punch than that. Built into this US Army surplus target drone you’ll find an ITX form-factor computer with a Via C7 500 MHz processor that is running Backtrack 4, the popular [...]
-
-
1:28
»
remote-exploit & backtrack
Bonjour, je débute dans le wifi et j’aimerai savoir si l’alpha AWUS036H 1 watt et compatible sur backtrack 3. J’aimerai également savoir si le site suivant pour acheter cette carte usb wifi est fiable : tandco.fr.
J’aimerai savoir pourquoi l’alpha 500 milliwatt est plus cher que la 1 watt. Selon ma logique sa devrai être le contraire, non ?
Merci de me répondre.
Cordialemant,
-
-
9:00
»
Hack a Day
Inside this box you’ll find a La Fonera wireless access point. [Emeryth] and his band of miscreants built this portable device for WiFi security testing. The AP is running OpenWRT and has been set up to use the 16×4 character display as a terminal. An ATmega88 connects the LCD as well as six buttons to [...]
-
-
10:00
»
Hack a Day
The Sprint version of the Palm Pixi doesn’t have a WiFi option but the Verizon version (called the Palm Pixi Plus) does. The hardware is almost the same and [Gitit20] figured out how to do some hardware swapping to add WiFi. The radio board inside the phone is fairly easy to remove. Close inspection of [...]
-
-
6:13
»
Hack a Day
Students at the Rochester Institute of technology have put together this WiFi hotspot that is powered by a wind turbine and a solar panel. It gets its signal through a parabolic antenna pointed at a near by building and repeats it for use in the vicinity. They are using a 30W solar panel, along with [...]
-
-
11:39
»
Hack a Day
Amidst the noise of a bazillion robots and Tesla coils at the 2010 Bay Area Maker Faire, we located a bubble of usable WiFi, and got a nearby power charge to boot. If nothing else here, we want this: The SolarPump Charging Station is a self-contained oasis of free power for laptops, cel phones and [...]
-
-
7:29
»
Hack a Day
[Chris Farnell] and [Michael Helms] are the brains behind this scary looking piece of machinery. It is a Coil gun, mounted on a turret, that is controlled over WiFi. If that wasn’t scary enough, they have rigged it to their iphone/ipad for remote shooting. Though it looks bulky, you can see that it is surprisingly [...]
-
-
6:00
»
Hack a Day
[.ronin] built an all-in-one WiFi and Bluetooth sniffer. He used a Nerf rifle as a base and added two Pringles cantennas, a tablet PC, and other various bits to tie it all together. Now he wanders the streets, explaining the device to bewildered passersby. After showing the device at CarolinaCon 2010 (here’s a PDF of [...]
-
-
0:27
»
remote-exploit & backtrack
i just recently downloaded the Church Of Wifi password list which is 40gb in size...however when i try to open any of the files in kate or hex editor i don't get much apart from random ascii. I know people have had sucessfully used the Church Of Wifi wpa tables or else the torrent wouldnt still be up, however trying to use the files in airolib-ng have not been sucessful.. If anyone could provide some advice on how to use these tables or with which program would be great
-
-
12:29
»
remote-exploit & backtrack
hi :)
i had downloaded the last version of BACKTRACK (version 4) from its official website
Name: bt4-final.iso
Size: 1570 MB
MD5: af139d2a085978618dc53cabc67b9269
i booted from the DVD and i got the Boot screen from where i can choose from 5 Options.
i want to get into graphical mode so when i try to do it i got this error :
ldm_parse_tocblock(): Cannot find TOCBLOCK, database may be corrupt.
but it countinuous and many operations are done succefully. in the End the Command line appears "root@bt:~#" and wait for me te enter some Commands.
how should i proceed?
can anyone confirm the existence of the graphical mode in Backtrack 4?
how can i get it working on my laptop?
my laptop is HP DV7 3010eg (5 months old) very good condition.
Windows 7 german
PS: i tried to boot from Knoppix or Kanotix CD (i don't know wich is the official name) but i got an error that the Kanotix filesystem does not exist. but the CD works properly in teh Graphical mode on my Desktop PC without any problem.
Please don't forget my main object is to hack WIFI Passwords. just to know the ways how to do it and how it works to avoid the attacks from others :rolleyes:
thanks a lot
-
-
5:42
»
remote-exploit & backtrack
hey all i am new hire,
first sorry for my englisch i am from Belgium :)
bt4 works fine, but if i run bt4 with usb its go very fast..
now a create a bt4 virtual on my PC, but the problem is i can surf the Internet, but when i go to network he says not wireless found? isent only working with a wiffi usb stick?
wean i run bt4 on usb he reconnaissance my card and i triad to hack my one wifi en its work out for me
i stil not under stand way i can do that on virtual ?
very sorry for my English
-
-
14:23
»
remote-exploit & backtrack
Hello ... very warmly
I'm new to this forum .. The first thing I would say is if you located the badly about it immediately apologize and please move if need be ...
But going to the heart of the matter.: Today I installed Back Track 4 on VB, I do everything I did and it works like a doll, so to speak. But one thing, namely MAIN - Not working: (. Is it WIFI, and here once I would like to emphasize that I have a USB WiFi antenna, the exact model of antennas - AirLive WL-1600USB
Please help, because they probably know from personal experience that BackTrack without an Internet connection is useless
P.S. VBoxGuestAdditions - has already been installed
Edit :
Slight correction: As for the Internet: I have internet signal, all you need to move the walls, but I still can not set the `interfaces in WIFI card ...,
Still waiting for answers...,
Thanks in advance, and Yours sincerely,
Szpaner
-
-
9:46
»
remote-exploit & backtrack
ok well my first problem is i dont know how to get it to read my wifi card when i type airmon-ng stop wifi0 it says interface(eth1) chipset(unknown) driver(airo)
when i use my auditor live cd it reads my wifi card and it works ic an use kismet and things like that. but when i boot backtrack on my harddrive it wont read it.
my second thing is more of a question which is when im using my auiditor disc and i trying to send packects and capture them using airforge it says there is no buffer space to send packets or something. im sure these are pretty n00b questions but can somebody please help.
-
-
11:48
»
remote-exploit & backtrack
hello guys i got a problem with gerix the first time i used it
it worked perfectly but then when i booted it again every time i open gerix
then i enable the interface and when i click to search for wifi networks it stucks
any idea????????
-
-
3:56
»
remote-exploit & backtrack
salve a tutti, oggi stavo pensando che sono stufo di usare il la scheda di rete intel e che vorrei cambiarla in una realtek.. è una cosa possibile?
come posso verificare la compatibilita delle schede? grazie
-
-
10:14
»
remote-exploit & backtrack
You become when I have a key and do not enter how certain with backtrack 4?
-
-
12:47
»
remote-exploit & backtrack
I am using Backtrack 4 and the card I have is a GIGABYTE GN-WI01GT AirCruiser G Mini-PCI-E and for the life of me I cannot get it recognized. I just installed BT4 last night and it was working a minute and I did airmon-ng stop wlan0 and I can't get it back up. I did the command to start /etc/init.d/networking when BT is loaded and I tried to start the NETWORK service. I also tried the following commands.
ifconfig wlan0 up
iwconfig wlan0 up
dhcpcd wlan0 up
/etc/init.d/networking start
/etc/init.d/networking restart
airmon-ng start wlan0
I am using wlan0 because thats what it was before this little mishap. Everytime I try those commands it tells me No Such Device. When I do iwconfig wlan0 isn't even showing up.
Thanks for the help.
Edit: The card uses AR5008 (Chipset AR5416)
Edit #2: Ok I guess I got it working again. I typed: modprobe ath5k then sudo ip link set wlan0 up and it started working again. I don't know if it did it on its own or because that command. Can someone confirm this?
Edit #3: Ok scratch that its not working, but it is showing up.
-
-
16:19
»
remote-exploit & backtrack
hi everybody.can anyone teach me how to crack wpa with fake ap in gerix plz?i will be very thankful to him.plz reply me on my email
musadiq_king@hotmail.com
-
-
7:44
»
remote-exploit & backtrack
Good morning!
So here is probably the craziest scenario-
my ALFA AWUS050NH is in monitor mode, but when I run:
# airodump-ng ra0
it only sees ONE wifi network. The same wifi network on EVERY channel, and there's 5 around me, which is so odd..
any ideas?
Thanks in advance =)
-
-
6:34
»
remote-exploit & backtrack
Non riesco a far funzionare backtrack 3live cd(scusatemi se ho postato su bactrack 4,ma per il momento ho solo questo disponibile)sulla mia scheda intel pro/wireless 3945 abg .
Sto cercando di trovare la password wep su una rete che ho creato con un portatile(rete ad hoc) e che ho chiamato prova.Ho connesso la rete,ma non è in connessione con altri pc.
Dopo aver dato i comandi per attivare monitor mode sulla mia scheda
Modprobe r iwl3945
Modprobe ipwraw
Faccio da terminale iwconfig e trovo la mia interfaccia(wifi0)
Dopo aver cambiato il mac,faccio da terminale airodump-ng wifi0 e trovo la mia rete(prova)
Poi apro altro terminale e do airodump-ng c (canale) w wep123 bssid (bssid) wifi0.
A questo punto incominciano a correre i pacchetti,ma la colonna data resta a 0.Forse perché il pc non sta in contatto con un client?
Allora provo liniezione
Aireplay-ng -1 0 a (bssid) h (mac fake) e prova wifi0
A questo punto mi dice no such bssid available.Ho pensato che la mia scheda non supporti liniezione,allora ho provato il comando aireplay-ng wifi0 -9.Esce fuori iniezione sta funzionando-trovati 2 aps-96:90:ecc. ch10 prova 0,028/0,028/0.028-1/30 3% e poi si blocca tutto,non posso più muovere mouse e devo spegnere da pulsante.
Ho letto che qualcuno con questa scheda è riuscito,ma non capisco dove sia il problema.Grazie per laiuto.
-
5:39
»
remote-exploit & backtrack
I have switched from BT3 to BT4 on my Macbook Pro 2.1.
My wifi card is Atheros and is detected and working out of the box. In Bakctrack 3 when I used airmon-ng and airodump-ng the signal power was shown in positive dBs but now it's all negative.
It can still inject packets and sniff around but is this normal or should I update the drivers or smt?
Thanks
-
0:35
»
remote-exploit & backtrack
hello Everybody!!!
i have decided to install backtrack 4 on my laptops hard drive, as i was using BT3 off a live cd, now bt3 never gave me a problem with my wifi card which is an intel 3945. after i finished instaling bt4 i tried using my wifi and notice that it doesn't detect it, can anybody please help me out?? also i tried cracking my own wep with backtrack 4 just like i did on bt3 but notice the command ares different can anybody help me out if possible??
i used to use this command:
modprobe -r iwl3945
modprobe ipwraw
ifconfig wifi0 down
airmon-ng stop wifi0
macchanger --mac
airmon-ng start wifi0
airodump-ng wifi0
airodump -c -w --bssid wifi0
aireplay-ng -1 0 -a -h -e wifi0
aireplay-ng -3 -b -h wifi0
aircrack-ng -n64 -b (whatever the name was).01.cap
has any of this change on bt4??
sorry if my questions are too stupid but if i never ask i will never know
-
0:35
»
remote-exploit & backtrack
hello Everybody!!!
i have decided to install backtrack 4 on my laptops hard drive, as i was using BT3 off a live cd, now bt3 never gave me a problem with my wifi card which is an intel 3945. after i finished instaling bt4 i tried using my wifi and notice that it doesn't detect it, can anybody please help me out?? also i tried cracking my own wep with backtrack 4 just like i did on bt3 but notice the command ares different can anybody help me out if possible??
i used to use this command:
modprobe -r iwl3945
modprobe ipwraw
ifconfig wifi0 down
airmon-ng stop wifi0
macchanger --mac
airmon-ng start wifi0
airodump-ng wifi0
airodump -c -w --bssid wifi0
aireplay-ng -1 0 -a -h -e wifi0
aireplay-ng -3 -b -h wifi0
aircrack-ng -n64 -b (whatever the name was).01.cap
has any of this change on bt4??
sorry if my questions are too stupid but if i never ask i will never know
-
-
19:26
»
remote-exploit & backtrack
OK so I'm new to BackTrack and I'm curious about the command line...as the title says I am booting BT4 from a 2gb usb in the persistent mode. After I load the gui how would I connect to my home network wifi? :confused:
-
10:06
»
remote-exploit & backtrack
Hello,
well,i'm new onto bt place,a great package imho to learn.
i'm not here to post problems,wrong place posts etc..
i'm a kind of newbie into wifi reverse,my location didn't allowed to test it in real mode.
my question is simple,after reading many tutorials and vids,something is not answered for me.
If i hack a wep,wpa (with easy pass),may i able to gain access to the weak host..files?(i mean the guy or girl sharing his AP with weak pw).
how to get access to his computer once wifi hacked?
well,i dont except a vidz tut to do it ;) but what to do if so.
thanks!!
-
-
15:21
»
remote-exploit & backtrack
ya se que es una cosa simple pero a mi me gusta que el led se encienda, parpadea cuando busca red y fijo cuando esta conectado.
Es mi primera aportación y espero que no sea la última
Pongo los pasos para la ipw2200, pero me imagino que para las demas es igual.
1. Abir /etc/modprobe.d/options
2. Añadir la siguiente linea:
options ipw2200 led=1
saludos
-
10:59
»
remote-exploit & backtrack
Saluti a tutti.
Ho installato bt4 su un pc con 3 interfaccie wireless. Ho configurato con wicd la connessione con la mia rete utilizzando una delle tre interfaccie per comandare il pc da remoto (vnc-ssh).
Avendo la necessità di connettere un'altra interfaccia ad un altra rete, mi sono accorto che non posso utilizzare wicd-client che mi disconnette dalla rete predefinita.
Ho provato con iwconfig senza successo. Volevo usare wpa_supplicant ma non trovo il file di configurazione nel solito percorso /etc/wpa_supplicant/wpa_s..conf.
Grazie se qualcuno può aiutarmi.
-
-
6:34
»
remote-exploit & backtrack
bonsoir à tous ceux qui liront ce post,
Alors voici mon problème : je n'arrive pas a mettre en oeuvre ma carte wifi (intel wifi pro 1000 series) sous BT4.
Voici ma démarche :
avant toute chose, un coup d'oeil aux indications de nagual :
commandes-utiles-et-infos-donner-pour-avoir-une-reponse
Donc je détermine si ma carte wifi est détectée :
Code:
lspci | grep Network
03:00.0 Network controller: Intel Corporation Wifi Link 1000 Series
iwonfig
lo no wireless extensions.
eth0 no wireless extensions.
wmaster0 no wireless extensions.
wlan0 IEEE 802.11bgn ESSID:""
mode: Managed Frebquency:2.412 GHz Acess Point: Not-Associated
Tx-Power=0 dbm
Retry min limitk:7 RTS thr :off Fragment thr:off
Encryption key=off
Power Managment=off
Link Quality:0 Signal level:0 Noise level:0
Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
Tx exessive retries:0 Invalid misc:0 Missed beacon:0
ensuite je regarde les drivers installés (je dois reconnaitre que je ne sais pas quel drivers utilise ma carte entre les intel pro et le driver madwifi mais le problème est autre):
Code:
airdriver-ng installed:
Found following stacks installed:
2. mac80211
Found following drivers installed:
2. ADMtek 8211-mac80211
3. Atmel at76c50x- IEEE80211 Softmac
7. Cisco/Aironet 802.11 - IEEE80211 Softmac
8. HostAP - IEEE80211
9. Intel Pro Wireless 2100 B - IEEE80211
10. Intel Pro Wireless 2200 (B/G)/2915 5 (A/B/G) - IEEE80211
13. Intel Pro Wireless 3945 A/B/G - mac80211
16. Madwifi[-ng] - IEEE80211
......
ensuite est-ce que ma carte est activée ? (c'est là où arrive le problème)
Code:
sudo ifconfig wlan0 up
SIOCSIFFLAGS: No such file or directory
Après recherches sur internet :
Archlinux.fr [Forums] • Afficher le sujet - [Wifi] SIOCSIFFLAGS : No such file or directory (resolu) et plus particulièrement à cette ligne :
Quote:
pour ce qui est de l'erreur SIOCSIFFLAGS, regarde dans /var/log/messages.log si tu n'aurais pas un firmware manquant.
|
mais là pour ce qui est du journal d'erreurs vous verrez après recherches qu'ils faut regarder dans
Quote:
pour trouver les erreurs qui nous concernent à savoir:
Quote:
Jan 26 22:34:53 bt firmware_helper[13396]: main: error loading '/lib/firmware/iwlwifi-1000-1.ucode' for device '/class/firmware/0000:03:00.0' with driver 'iwlagn'
Jan 27 00:43:52 bt firmware_helper[17958]: main: error loading '/lib/firmware/iwlwifi-1000-2.ucode' for device '/class/firmware/0000:03:00.0' with driver 'iwlagn'
|
J'imagine que comme moi vous n'avez trouvez que la version 3 de ces µcodes donc on l'a dans le c**l.
Donc ma/mes questions :
Où peut-t-on trouver les versions 1 et 2 de ces µcodes ?(mes recherches sur google ont été infructeuses pour trouver les versions antérieures).
si ils ne sont pas trouvables : il y a t-il une autre alternative que de changer de kernel comme suggéré ici
Sabayon Forums • View topic - Intel Wifi link 1000 problem?
Comme dit ci-dessus, si vous avez une solution/indication, faite le moi savoir svp....
Merci d'avoir pris la peine de lire ce post qui je l'espère vous a guidé ( c'est pourquoi j'ai tant détaillé) ou donné envie de m'aider ( c'est pourquoi je l'ai écris ^^ ) .
-
-
14:24
»
remote-exploit & backtrack
As the title stated, I am trying to find some facts about
WHICH USB Wifi N-Draft that is known to work with Backtrack installed on VMWare Fusion.
The USB N-Draft that I am looking are the ones that supports
BOTH 2.4Ghz and 5Ghz.
If someone has used a particular USB N-Draft Wifi for the above, could you share the brand, model and where you buy it?
Thanks!
-
-
10:15
»
remote-exploit & backtrack
salut tous,
Je voulais savoir comment hacker un pc quand on a hacké son wifi. J'obtiens donc son ip en hackant le wifi mais comment pénétrer le pc de la victime? pourriez-vous m'éclairer?
Merci
-
-
11:16
»
remote-exploit & backtrack
anyone know how to get the wifi led working with BT4 Final? everything else works great.
card is Atheros AR5001 if that matters, though i suspect it does not.
thanks for the help
-
-
10:09
»
remote-exploit & backtrack
bonjour,
je configure ma connection (backtrack 4) avec les videos sur offensive security.
tout se passe bien sauf jusqu'a que je lance wicd, il demarre mais ne capte pas de point acces wifi...
ma carte wifi est reconnu.
-
7:02
»
remote-exploit & backtrack
Bonjour ,voila j'ai installer backtrack 4 sur Mon pc portable ,mai il ne reconnait pas ma carte wifi Atheros AR5B91 et je n'arrive pas a trouver sur internet les drivers pour utiliser ma carte wifi ,j'aimerai savoir commant faire pour trouver ces divers et comment les installer, mercis
-
3:32
»
remote-exploit & backtrack
Ciao
Sono da ieri passato a BT4.
Non essendo molto pratico di linux, mi sono trovato subito in difficoltà.
In paticolare volevo fare un aggiornameno di sistem sudo apt-get update.
Ma non riesco a trovare un tool per connettermi direttamente sul mio AP wifi con chiave VPA.
Ho scaricato dal sito di ubuntu wifi-radar, ma non funziona, in pratica parte si collega ma non riesce ad ottenee un indirizzo iP dal router.
Come posso risolvere?
Grazie
-
-
6:47
»
remote-exploit & backtrack
Im using Compaq CQ40-517tu laptop ive finish downloading BT 4 my problem is that the wifi adapter is not detected how am i able to fix this?
-
-
13:13
»
remote-exploit & backtrack
Hey there everyone, first off I'd like to thank all the great people at BT who made this swiss army knife of tools possible! You Rock!
So here is the problem. I'm using a BT4 final live cd and Aircrack on my router. I try to inject but I cannot for the life of me get some IV's!! Here's some information about my setup and things I've tried:
- I have an Acer 4736G Laptop (dunno if that helps)
- It has an intel 5100 AGN Wifi card, that uses the iwlagn drivers in BT4
- My router is a Dlink DIR-600
- Injection test is working fine (or so it says)
- I've attempted to do arp replay attack but I got 54 ARP's after 20 mins and 130K packets sent and no deAuth packets
- I tried to the the chopchop attack from Xploitz video I saw here, but it says the fragmentation failed.
question, is my wifi card just not compatible? Or, am I doing something wrong? Any tips you'd like to suggest?
Thanks in advance to anyone who responds!
P.S: I initially posted this on someone else's thread in the wireless section, but when I checked my email it says n00bs can only post in the newbies section for the first 3 days. Sorry if this is considered a duplicate post :(