Added
|
Name
|
Description |
9/13/01
|
Wireless
Firewall Gateway White Paper
|
The network security group in the NASA Advanced
Supercomputing (NAS) Division developed a secure 802.11b wireless
networking system. They used an off-the-shelf PC running the OpenBSD
operating system, an Apache web server, the Internet Software
Consortium DHCP server, and IPF firewall software. This paper does
not contain implementation details, but has contact info for the
system's developers. |
9/13/01
|
Security
Fix for Wireless
|
SF Gate article by Henry Norr says help is on the
way for 802.11 security problems via four proposals submitted to the
IEEE Task Group i. |
9/5/01
|
Exploiting
and Protecting 802.11b Wireless Networks
|
ZD's ExtremeTech takes to the streets of NYC, New
Jersey, Silicon Valley, and Boston and finds that it's pretty easy
to grab a free 802.11b wireless connection. Last page
contains good tips for securing wireless LANs. |
8/14/01
|
Enabling
IEEE 802.11 Networks with Windows "Whistler"
|
Microsoft Driver and HW Development paper that
describes the changes needed to work with Windows XP's implemention
of the IEEE 802.1x port-based network access control draft standard. |
8/7/01
|
Using the Fluhrer, Mantin, and Shamir Attack
to Break WEP
|
Paper by Stubblefield, Ioannidis, & Rubin
describing details of the actual implementation of
WEP key recovery. |
8/7/01
|
Getting
the most out of WEP
|
This article by workingmac's John C. Welch is a good
explanation of what WEP does and doesn't do. Good to remember
with all the "WEP sky is falling" alarms going off! |
8/6/01
|
An
Inductive Chosen Plaintext Attack against WEP/WEP2
|
Slide presentation by Univ of Maryland's Bill
Arbaugh. Describes yet another method of getting WEP keys. |
8/6/01
|
The
Insecurity of 802.11
|
Slide presentation by Ian Goldberg of Zero-Knowledge
Systems, presented at the July 2001 Black Hat Briefings. Describes
the problems with WEP in a reasonably understandable way! |
8/5/01
|
Cipher attack delivers heavy blow to
WLAN security
|
EE Times article by Patrick Mannion that describes the latest problems
with WEP security. This new discovery essentially puts the
nail in WEP's coffin! |
8/5/01
|
"Weaknesses
in the Key Scheduling Algorithm for RC4" (PDF)
(alternative
source - Postscript format)
|
The paper by Fluhrer, Mantin, & Shamir that the above EE Times article is based
on. (You'll need a good math or cryptography background to get
much out of this paper!) |
7/12/01
|
Often
unguarded wireless networks can be eavesdroppers’ gold mine
|
Similar article to the "War Driving" one
above, it's also about Peter Shipley's mission to raise awareness
about 802.11b network security. |
7/12/01
|
War
Driving by the Bay
|
Probably the first article about "War
Driving", or the technique of driving around, looking for
unsecured 802.11b networks. |
7/10/01
|
The
War over 802.11x Security
|
ZDNet's Rich Santalesa's article talks about Marius
Milner's Net Stumbler and the work that the IEEE 802.11 Task Group
is doing on improving wireless security. |
7/3/01
|
Secure
Your Wireless Network
|
Our own little checklist of simple things you can
do to protect your wireless LAN from intuders! |
6/20/01
|
ISS
XForce: Atmel SNMP Authentication Flaw
|
If you have a Linksys WAP11 or NETGEAR ME102 Access
Point, you should read this
ISS XForce Security advisory. Home users probably don't need to
worry, but business users should take note! |
6/20/01
|
ISS
XForce: Symbol AP SNMP WEP key flaw
|
This
ISS XForce Security advisory should be read by users of Symbol
Technologies based 802.11b Access Points (3Com Airconnect, Intel Pro
2011, etc.). It details another SNMP related security flaw. |
|
Overview of IEEE 802.11b
Security (Intel)
|
Reasonably understandable article on 802.11b Security. |
|
WEP
Encryption (ORiNOCO]
|
ORiNOCO article on WEP Encryption. Contains
good information on how multiple keys are supposed to work. (PDF) |
|
(In)Security
of the WEP Algorithm
|
This is the paper by those troublemakers (just
kidding guys!) at University of California at Berkeley that started
all the hand-wringing over 802.11 wireless security. |
|
Your
802.11 Wireless Network Has No Clothes
|
Not to be outdone by those California guys, this
paper (PDF) by a University of Maryland at College Park team, this
paper says that all 802.11 security mechanisms are
flawed! |