X hits on this document

25 views

0 shares

0 downloads

0 comments

11 / 12

Wireless Hacking Tools

http://www.cse.wustl.edu/~jain/cse571-07/ftp/wireless_hacking/

[21] "AirJack", http://sourceforge.net/projects/airjack/

[22] "Simple-replay", http://www.802.11mercenary.net/simple-replay/

[23] Black Alchemy Enterprises, "FakeAP", http://www.blackalchemy.to/project/fakeap/

[24] Floeter, R., "Void11", http://www.wirelessdefence.org/Contents/Void11Main.htm

[25] Laurie, A., Holtmann, M., Herfurt, M., "BlueSmack", http://trifinite.org/trifinite_stuff_bluesmack.html

[26] Laurie, A., Holtmann, M., Herfurt, M., "BlueChop", http://trifinite.org/trifinite_stuff_bluechop.html

[27] Gianluigi Me, "Exploiting buffer overflows over Bluetooth: the BluePass tool", WOCN 2005, March 2005

[28] Laurie, A., Holtmann, M., Herfurt, M., "BlueSnarf++", http://trifinite.org/trifinite_stuff_bluesnarfpp.html

[ 2 9 ] L a u r i e , A . , H o l t m a n n , M . , H e r f u r t , M . , " B l u e B u m p " , h t t p : / / t r i f i n i t e . o r g / t r i f i n i t e _ s t u f f _ b l u e b u m p . h t m l

[30] "Bluetooth Attacks", http://www.viruslist.com/en/analysis?pubid=181198286

[31] "Top 3 Attack Tools Threatening Wireless LANs", http://whitepapers.techrepublic.com.com/webcast.aspx?docid=161061

[32] "Wardriving Tools", http://www.wardrive.net/wardriving/tools

[33] "Widely Used Attack Tools", http://www.networkdictionary.com/security/Widely.php

[34] Phifer, L "Anatomy of a Wireless "Evil Twin" Attack (Part 1)", http://www.corecom.com/external/livesecurity/eviltwin1.htm 2005

[35] "Wi-Foo, The Secrets of Wireless Hacking", http://www.wi-foo.com/index-2.html

[36] Wilds, B., "Wireless Man in the Middle Attack Part 2", http://blogs.ittoolbox.com/wireless/networks/archives/wireless-man-in-the-middle-attack-part-ii-7421

Back to Table of Contents

List of Acronyms

ACK AP DoS EAP ISAKMP MAC MSCHAP OBEX OPP RADIUS RF

Acknowledgment Access Point Denial of Service Extensible Authentication Protocol Internet Security Association and Key Management Protocol Medium Access Control Microsoft Challenge-Handshake Authentication Protocol Object Exchange OBEX Push Profiler Remote Authentication Dial-In User Service Radio Frequency

11 of 12

12/19/2007 5:16 PM

Document info
Document views25
Page views25
Page last viewedSun Dec 04 06:13:33 UTC 2016
Pages12
Paragraphs242
Words4393

Comments