Security Weekly
Wireless Security

Wireless Network Security? – Latest Revision

I first created this presentation about a year ago, with the goal to raise awareness about some of the less publicized wireless attacks in use today. It has grown into a 98 slide presentation that covers Wifi, Bluetooth, RFID, and wireless driver attacks, including how to defend yourself. Its a blast to give, and fun to watch as we demonstrate numerous wireless attack tools, such as bluesnarfer, airpwn, KARMA, and others.
Larry has been kind enought o update it, test all of the demos, and add some good technical content. You can download a PDF version of the latest version here:
Wireless Network Security?
If you use any of the information above, we just as that you ask permission and give use credit. We believe it is important to continue to educate people about the wireless threats that we face.
If you have comments, questions, suggestions, and especially corrections about this presentation please contact us at [email protected]

Paul Asadoorian

Paul Asadoorian spent time “in the trenches” implementing security programs for a lottery company and then a large university. Paul is offensive, having spent several years as a penetration tester. He is the founder of the Security Weekly podcast network, offering freely available shows on the topics of information security and hacking. As Product Evangelist for Tenable Network Security, Paul built a library of materials on the topic of vulnerability management. When not hacking together embedded systems (or just plain hacking them) or coding silly projects in Python, Paul can be found researching his next set of headphones.Paul Asadoorian spent time “in the trenches” implementing security programs for a lottery company and then a large university. Paul is offensive, having spent several years as a penetration tester. He is the founder of the Security Weekly podcast network, offering freely available shows on the topics of information security and hacking. As Product Evangelist for Tenable Network Security, Paul built a library of materials on the topic of vulnerability management. When not hacking together embedded systems (or just plain hacking them) or coding silly projects in Python, Paul can be found researching his next set of headphones.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.