#WirelessSecurity

2025-12-22

๐ŸŽ Holiday Giveaway๐ŸŽ

Sponsored by Suzu Labs, the Phillip Wylie Show is giving away a HAK5 WiFi Pineapple Pager โ€” a powerful tool for wireless security assessments and red team operations.

๐Ÿ‘‰ Enter here: suzulabs.com/giveaway

Huge thanks to Suzu Labs for supporting the cybersecurity community.

#Cybersecurity #OffensiveSecurity #PenTesting #WirelessSecurity #Giveaway

VRS Technologies LLCcctvinstallation
2025-11-11

Enhance Safety with Wireless Security Camera Systems Dubai

VRS Technologies LLC provides top-grade Wireless Security Camera Systems Dubai for homes and businesses. Our advanced wireless CCTV solutions ensure seamless monitoring, reliability, and easy installation. For expert setup and support, contact us at +971505319306.

Visit Us: cctvinstallationdubai.ae/servi

Wireless Security Camera Systems Dubai
2025-10-26

Auch 2026 findet wieder ein #GI-SPRING-Graduiertenworkshop der Fachgruppe Security - Intrusion Detection and Response (SIDAR) statt. Diesmal am 21. und 22.04.2026 in #Heidelberg.

Zu den Themen gehรถren #VulnerabilityAssessment, #ThreatIntelligence, #IntrusionDetection, #Malware, #IncidentManagement, #WirelessSecurity, #DigitalForensics usw.

Einreichungen werden bis zum 15.03.2026 angenommen.

spring.fg-sidar.gi.de

#CyberSecurity #Conference

2025-09-24

๐Ÿ‰ Kali Linux 2025.3 Release โ€” Vagrant, Nexmon & NetHunter Love ๐Ÿš€

Kali 2025.3 just dropped with a tidy set of quality-of-life updates and some neat platform improvements. The team refreshed how they build Vagrant images (moving the VM workflow away from Packer towards a cleaner build pipeline), making virtual images easier to manage for labs and CI. ๐Ÿงฉ๐Ÿ–ฅ๏ธ

A big win for wireless researchers: Nexmon support returns (Broadcom/Cypress chips), bringing monitor mode and injection support back to devices including Raspberry Pi models (now supporting Pi 5). That means more accessible packet capture and radio experiments on compact SBCs. ๐Ÿ“ก๐Ÿง

Kali is also trimming legacy support โ€” dropping ARMel โ€” and polishing desktop niceties like a configurable Xfce VPN-IP panel so multi-VPN users can choose which interface to show. ๐ŸŒ๐Ÿ”ง

New tools (10) were added to the repos โ€” highlights include Caido, Detect It Easy (DiE), krbrelayx, ligolo-mp, llm-tools-nmap, and patchleaks โ€” plus many package updates. Expect easier reverse/forensics workflows, Kerberos tooling, AI-cli helpers, and utilities to speed up patch validation. ๐Ÿงฐโœจ

Kali NetHunter also got attention: a Nexmon-enabled Samsung Galaxy S10 image (budget-friendly internal monitor + injection), CARsenal (car-hacking toolkit) updates and refactors, Magisk module support for kernel modules (experimental), and a raft of bug fixes/UI work for mobile tooling. ๐Ÿ“ฑโš™๏ธ

ARM builds were refined (recommend arm64 Raspberry Pi images, Pi 5 support, kernel update fixes) and there are the usual documentation updates, community wallpapers, and repository tweaks. If you run Kali in lab or mobile setups, this release is worth testing. ๐Ÿ”๐Ÿ“š

โš ๏ธ Disclaimer:
For educational & authorized use only. Kaliโ€™s wireless/attack-capability features (monitor/injection, CARsenal, NetHunter) must be used responsibly in controlled labs or with explicit permission.

#KaliLinux #Kali2025 #NetHunter #Nexmon #Infosec #PenTesting #WirelessSecurity #CyberSecurity #InfoSec

Annual Computer Security Applications ConferenceACSAC_Conf@infosec.exchange
2025-09-04

The fourth presentation was Ayoub et al.'s "BlueScream: Screaming Channels on Bluetooth Low Energy," exploring real-world firmware attacks via side-channel vulnerabilities in #BLE devices. (acsac.org/2024/program/final/s) 5/6 #SideChannelAttack #WirelessSecurity

Ayoub et al.'s "BlueScream: Screaming Channels on Bluetooth Low Energy"
CosicBeCosicBe
2025-07-17

This summer, our researcher Nikola Antonijeviฤ‡ attended & wrote a blog post on "Security in the Inaudible World" โ€“ challenges in inaudible communication ๐Ÿ‘‡
๐Ÿ”— esat.kuleuven.be/cosic/blog/wi

Nikola also presented "ZeroTouch" at , reinforcing RSS for secure geofencing ๐Ÿ‘‡ esat.kuleuven.be/cosic/blog/ze

2025-05-24

Wireless Security Protocols Explained: WEP, WPA, WPA2 & WPA3 ๐Ÿ“ก๐Ÿ”

Understanding wireless security protocols is essential for protecting your network from unauthorized access and ensuring data confidentiality.

๐Ÿ“˜ Key Protocols & Their Characteristics:

1. WEP (Wired Equivalent Privacy)
โ€ข Introduced in 1997
โ€ข Weak encryption (RC4), easily cracked
โ€ข Deprecated and insecure

2. WPA (Wi-Fi Protected Access)
โ€ข Interim solution after WEP
โ€ข Improved encryption with TKIP
โ€ข Still vulnerable to certain attacks

3. WPA2
โ€ข Widely used today
โ€ข Uses AES-based CCMP encryption
โ€ข Supports enterprise (RADIUS) and personal (PSK) modes

4. WPA3
โ€ข Latest standard with stronger security
โ€ข Resistant to brute-force attacks
โ€ข Supports SAE (Simultaneous Authentication of Equals)
โ€ข Enhanced encryption and forward secrecy

Why it matters:
Choosing the right wireless protocol significantly affects your networkโ€™s resilience against common attack vectors such as packet sniffing, replay attacks, and credential theft.

Disclaimer: This post is for educational and awareness purposes only. Always secure your wireless networks using the latest standards.

#WirelessSecurity #WPA3 #WEP #WPA2 #CyberSecurity #InfoSec #EducationOnly #WiFiProtocols #NetworkSecurity #WiFiEncryption

2025-05-24

Wireless Penetration Testing Tools You Should Know ๐Ÿ“ก๐Ÿ”

Wireless networks can be a critical attack surface if not properly secured. These tools are widely used in authorized lab environments to assess the strength of Wi-Fi configurations and encryption protocols.

Use cases include:
โ€ข Testing weak encryption (WEP/WPA)
โ€ข Detecting rogue access points
โ€ข Capturing and analyzing authentication handshakes
โ€ข Teaching wireless attack vectors in controlled labs

Disclaimer: This content is for educational and ethical use only. Wireless testing must only be performed on networks you own or have explicit authorization to audit.

#WirelessSecurity #WiFiPentest #CyberSecurity #InfoSec #EthicalHacking #EducationOnly #RedTeamTools #WirelessAuditing #AircrackNG #WPA2

2024-12-24

๐Ÿ“ก SDR Hacking Advanced: Reversing & Exploiting Wireless Communications at Hardwear.io
๐Ÿ“… May 27-29, 2025
โฐ 9:00 AM - 5:30 PM PDT
๐Ÿ“ Santa Clara Marriott

๐ŸŽฏ Dive into SIGINT techniques, reverse engineering, and real-world RF exploits.

Register now: buff.ly/4fw9dKe

#SDRHacking #SIGINT #WirelessSecurity #Hardweario

Jennifer (JJ) Minellajjx@infosec.exchange
2023-12-15

#WLPC reg opens today and for the first time ever I submitted a 3-day Bootcamp training!!

Also the 2024 Deep Dive is updated for a deeper look at WPA3 including packet captures.

Teaching with @subnetwork

#wifisecurity #wirelesssecurity #cybersecurity #networksecurity

๐Ÿ›ก H3lium@infosec.exchange/:~# :blinking_cursor:โ€‹H3liumb0y@infosec.exchange
2023-12-07

"๐Ÿง BLUFFS Attack - A Deeper Dive into the Threat Landscape ๐Ÿ•ต๏ธโ€โ™‚๏ธ๐ŸŒ"

The recent discovery of the BLUFFS vulnerability in Bluetooth BR/EDR devices, as detailed in CVE-2023-24023, poses a significant security risk. This vulnerability affects devices supporting Secure Connections pairing and Secure Simple Pairing in Bluetooth Core Specifications 4.2 through 5.4. It allows man-in-the-middle (MITM) attacks that can force a short key length, potentially leading to the discovery of the encryption key and enabling live injection attacks.

The ACM SIGSAC Conference paper titled "BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses" further explores this issue, presenting six novel attacks that break Bluetooth sessions' forward and future secrecy. These attacks exploit vulnerabilities in the Bluetooth standard related to unilateral and repeatable session key derivation.

The Bluetooth Special Interest Group (SIG) addresses has acknowledged the vulnerability and recommends that implementations reject service-level connections on an encrypted baseband link with key strengths below 7 octets. For enhanced security, using Security Mode 4 Level 4, which rejects connections below 16 octets, is advised. Additionally, tracking that a link key was established using BR/EDR Secure Connections and verifying subsequent encryption establishment is crucial to mitigate this risk. ๐Ÿ’ก๐Ÿ”

๐Ÿ”— MITRE ATT&CK Vectors - CVE-2023-24023

Tags: #CyberThreat #InfoSec #BLUFFSVulnerability
#BLUFFS #BluetoothHacking #SecureCommunication #CyberAttack #WirelessSecurity ๐Ÿ“ถ๐Ÿ›ก๏ธ

Source: The Hacker News NIST CVE-2023-24023 Detail and the ACM SIGSAC Conference paper

Track Down Ghosts in Your WiFi With the Pwnton Pack

If there's something weird in your Network Neighborhood, who you gonna call? If you want your WiFi troubles diagnosed in style, try calling [Travis Kaun] -- he might just show up wearing the amazing Pwnton Pack. Built from a replica Proton Pack similar to those used in the 1984 classic Ghostbusters , it's a portable wireless security diagnostics kit that should be able to pinpoint any weaknesses in your wireless network.

Inside, it's got a Mark VII WiFi Pineapple, which is a portable device designed for security testing purposes, as well as a Raspberry Pi running Pwnagotchi: a deep learning-based WiFi sniffer that aims to capture those network packets that help maximize your chances of brute-forcing the WPA key. These two devices are connected to an array of antennas, including a cool rotating 5 GHz panel antenna to scan the surrounding area.

Naturally, the Pwnton Pack also includes a Neutrona Wand, which in this case contains a 2.4 GHz Yagi antenna hooked up to an ESP32 programmed to perform deauthentication attacks. An Arduino Nano drives an LED matrix that shows scrolling Pac-Man ghosts, while a dedicated sound board provides movie sound effects. The whole system is powered by three LiPo battery packs, and can even be remotely operated if desired.

Sadly, it doesn't come with one of those ghost traps to suck up wayward WiFi networks, but the range of tools available should help to catch any kind of weird phantoms hiding in your system. We've spotted a few Proton Packs before, but never one with such advanced functionality. Security testing systems tend to be a bit less conspicuous, after all.

#securityhacks #wirelesshacks #ghostbusters #penetrationtesting #protonpack #wirelesssecurity

image
2019-04-11

Huh, I didn't know that there were already #WPA3-enabled #WiFi devices available. So much for it being a solution for #WPA2, but at least it's patchable. The question remains: will vendors update their devices and provide updates for devices that have already been sold? ๐Ÿค” #dragonblood #security #wifisecurity #wirelesssecurity

zdnet.com/article/dragonblood-

Tarik ๐Ÿฑโ€๐Ÿ’ปcrowd42
2017-04-25

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst