• 19 Aug 2014

    CommView for WiFi – a great option for wireless network analysis

    Several years ago I wrote about the neat WEP/WPA recovery tools offered as part of TamoSoft's wireless network analyzer called CommView for WiFi. Well, those tools are no longer available but CommView for WiFi is as relevant as ever. I've been using it for years. It seems that it hasn't changed a ton other than some UI and packet analysis enhancements - probably just oversights on my part since I ...

    Continue Reading...
  • 23 Nov 2010

    Stop all Wi-Fi deployments!

    A study in the Netherlands has found that Wi-Fi radiation will eventually result in the death of parts of tree leaves. Yep, take those access points and put them 20 inches from trees and let the killing being. Seriously!?Who's putting their access points that close to trees? Why are people even studying something like this? Apparently the "global warming" crowd is up to it again...I'm just glad those were Dutch ...

    Continue Reading...
  • 10 Mar 2009

    Using AirMagnet WiFi Analyzer for security assessments

    While I'm on a roll testing out the latest security tools (can you tell I'm finally getting caught up on things?!) I wanted to write the follow-up to this previous post I promised regarding AirMagnet's wireless network analyzer (now dubbed WiFi Analyzer).I've been using WiFi Analyzer for years...it now supports 802.11n for those of you on the "bleeding edge" and it even has some automated security checks for "n". As ...

    Continue Reading...
  • 12 Nov 2008

    New way to crack WPA on wireless networks

    Everything in security is just a matter of time, right? Well, a couple of researchers - one of which is the author of the Aircrack-ng tool that I've covered a lot over the years - have found a new way to crack the WPA TKIP key in a just a few minutes without using a dictionary attack (previously the only way to crack it). Reaffirms the arms race we're mired ...

    Continue Reading...
  • 04 Sep 2008

    PCI v1.2 = 802.1x for wireless? Yeah right!

    Apparently the new changes in PCI DSS v1.2 (due out in October) are going to require more robust wireless security. As if no new WEP implementations after March 2009 and none at all after June 2010 weren't enough...Wireless must now be "implemented according to industry best practices (e.g., IEEE 802.1x) using strong encryption for authentication and transmission".Yeah right!! So people using WEP not only have to upgrade their hardware but ...

    Continue Reading...
  • 28 Aug 2008

    Crazy things people do to get a Wi-Fi connection

    Here's a funny bit about things people have done to get wireless Internet access. Some of these are pretty stupid when you consider the consequences of connecting to a rogue AP where someone's watching your every move on the other end (i.e. web sites browsed, passwords entered, emails sent, etc.). Not to mention exploiting your system for remote access.Reminds me of how much I love my air card.......

    Continue Reading...
  • 21 Aug 2008

    A wireless security assessment tool you can’t overlook

    Many people tout how great open source and freeware wireless tools are for finding and exploiting wireless network vulnerabilities - myself included. However, if you're performing a wireless assessment, you don't want to overlook the value the commercial tools have to offer.The commercial tool I've been using for a while - since before I co-authored Hacking Wireless Networks For Dummies - is AirMagnet's WiFi Analyzer (formerly their "Laptop" product). It's ...

    Continue Reading...
  • 14 Jan 2008

    New evidence of wireless way before our time

    This is something that's been out there for a while, but when my Canadian colleague, security guru, and all-around good guy Peter Davis forwarded it to me, I laughed out loud. Had to share it:After having dug to a depth of 10 meters last year, American scientists found traces of copper wire dating back 100 years and came to the conclusion that their ancestors already had a telephone network more ...

    Continue Reading...