User Tools

Site Tools


links

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
links [2018/10/06 00:53] – Updated links and removed dead ones mister_xlinks [2019/04/14 22:43] (current) – [Additional Papers] Added 2 papers from M. Vanhoef mister_x
Line 9: Line 9:
   * [[https://www.cisco.com/c/en/us/products/collateral/wireless/aironet-1200-access-point/prod_white_paper09186a00800b469f.html|A Comprehensive Review of 802.11 Wireless LAN Security and the Cisco Wireless Security Suite]]   * [[https://www.cisco.com/c/en/us/products/collateral/wireless/aironet-1200-access-point/prod_white_paper09186a00800b469f.html|A Comprehensive Review of 802.11 Wireless LAN Security and the Cisco Wireless Security Suite]]
   * [[https://ptolemy.berkeley.edu/projects/ofdm/ergen/docs/ieee.pdf|“IEEE 802.11 Tutorial” Mustafa Ergen, University of California Berkeley, June 2002.]]   * [[https://ptolemy.berkeley.edu/projects/ofdm/ergen/docs/ieee.pdf|“IEEE 802.11 Tutorial” Mustafa Ergen, University of California Berkeley, June 2002.]]
 +  * [[https://web.archive.org/web/20070813043726/http://documentation.netgear.com:80/reference/fra/wireless/TOC.html|Wireless Basics (thanks to Netgear)]]
   * [[https://download.aircrack-ng.org/wiki-files/other/managementframes.pdf|Management Frames]] This is a really excellent one-page overview of management frames and error messages.   * [[https://download.aircrack-ng.org/wiki-files/other/managementframes.pdf|Management Frames]] This is a really excellent one-page overview of management frames and error messages.
   * [[https://en.wikipedia.org/wiki/Radiation_pattern|Radiation Patterns for wireless antennas and how to calculate it]]   * [[https://en.wikipedia.org/wiki/Radiation_pattern|Radiation Patterns for wireless antennas and how to calculate it]]
Line 59: Line 60:
   * [[https://papers.mathyvanhoef.com/woot2018.pdf|Symbolic Execution of Security Protocol Implementations:   * [[https://papers.mathyvanhoef.com/woot2018.pdf|Symbolic Execution of Security Protocol Implementations:
 Handling Cryptographic Primitives]] by Mathy Vanhoef and Frank Piessens Handling Cryptographic Primitives]] by Mathy Vanhoef and Frank Piessens
 +  * [[https://papers.mathyvanhoef.com/ccs2018.pdf|Release the Kraken: New KRACKs in the 802.11 Standard]], M. Vanhoef and F. Piessens
 +  * [[https://papers.mathyvanhoef.com/dragonblood.pdf|Dragonblood: A Security Analysis of WPA3’s SAE Handshake]], M. Vanhoef and E. Ronen
 ===== 802.11 Specifications ==== ===== 802.11 Specifications ====
  
Line 74: Line 77:
   * [[https://download.microsoft.com/download/5/7/7/577a5684-8a83-43ae-9272-ff260a9c20e2/WPA_Overview.doc|Wi-Fi Protected Access (WPA) Overview]]   * [[https://download.microsoft.com/download/5/7/7/577a5684-8a83-43ae-9272-ff260a9c20e2/WPA_Overview.doc|Wi-Fi Protected Access (WPA) Overview]]
   * [[https://technet.microsoft.com/library/bb878054|Wi-Fi Protected Access 2 (WPA2) Overview]]   * [[https://technet.microsoft.com/library/bb878054|Wi-Fi Protected Access 2 (WPA2) Overview]]
 +  * [[https://technet.microsoft.com/en-us/library/bb878126.aspx|Wi-Fi Protected Access Data Encryption and Integrity]]
 +  * [[https://technet.microsoft.com/en-us/library/bb878096.aspx|Wi-Fi Protected Access 2 Data Encryption and Integrity]]
   * [[https://www.informit.com/articles/article.aspx?p=370636|Cracking Wi-Fi Protected Access (WPA), Part 1]] by Seth Fogie, March 4, 2005   * [[https://www.informit.com/articles/article.aspx?p=370636|Cracking Wi-Fi Protected Access (WPA), Part 1]] by Seth Fogie, March 4, 2005
   * [[https://www.informit.com/articles/article.aspx?p=370636|Cracking Wi-Fi Protected Access (WPA), Part 2]] by Seth Fogie, March 11, 2005   * [[https://www.informit.com/articles/article.aspx?p=370636|Cracking Wi-Fi Protected Access (WPA), Part 2]] by Seth Fogie, March 11, 2005
links.txt · Last modified: 2019/04/14 22:43 by mister_x