Internationally recognized cybersecurity leader Dan Lohrmann learned how to get to “yes” the hard way when he was the chief information security officer at the state of Michigan.
A CISA official told legislators that in the fast-moving aftermath of an emergency, a vast disparate network of public and private actors must quickly share information, including documents, images or texts. That process can be corrupted if a threat actor got organizations to share files laced with malware.
Amichai Shulman, chief technology officer and co-founder of AirEye, warned of "more and more severe vulnerabilities in the implementation and design" of wireless network communication.
A while back, Joshua Wright wrote a fantastic paper called “Vista Wireless Power Tools for the Penetration Tester”. At the end of paragraph 2.5, “Analyzing Wireless Profiles”, Josh writes, “The PSK itself and other metadata is stored in the keyMaterial element. At this time, it is not known how to decrypt the PSK, however, since […]
Yes yours truly (Larry, that is) Will be teaching the 6 day SANS Wireless Ethical Hacking, Penetration Testing and Defenses (SANS 617) in Regina, Saskatchewan on March 23 – 28, 2009. As this is the first time Wireless Ethical Hacking, Penetration Testing and Defenses is being offered in Saskatchewan it is anticipated to fill quickly. […]
I’m always on the lookout for new ways to do recon during an assessment, or be aware how folks could be performing recon against an organization. Being aware of recon methods helps make recommendations to remediate potential exposure. One of the things that can be highly successful for recon on a target is wireless. I’m […]
[Note: This is a re-post from the wrt54ghacks.com blog which has been intergrated into this blog. For an even more updated version of this hack see my article in (IN)Secure Magazine, Issue 17] So, here is the scenario, you need a wireless network for guests, it has to be easily accessible (i.e. can’t require a […]