Главная
Study mode:
on
1
Intro
2
Introduction
3
What is Code Communication
4
Case Study
5
Probe Request Response
6
Beacon Frame
7
Beacon Frame Parameters
8
Probe Requests Response
9
Information Element
10
Beacons
11
Suspicious Eye
12
Outbreak of Malware
13
Partial Virtual Bitmap
14
Probe Request
15
Python Script
16
Traffic Indication Map
17
Deep Packet Inspection
18
Retrieving Lost Frames
19
Sequencing
20
Encoding
21
Stealth Mode
22
The Third Approach
23
Inspiration
24
Test Case
25
Version Field
26
Spin
27
Advantages
28
Learnings
29
Potential Approaches
30
Conclusion
Description:
Explore the hidden world of WiFi communication in this 45-minute conference talk from BruCON Security Conference. Delve into the intricacies of code communication, examining case studies and analyzing various aspects of WiFi protocols. Investigate probe requests and responses, beacon frames, and information elements. Uncover techniques for detecting suspicious activity and malware outbreaks. Learn about deep packet inspection, frame retrieval, and sequencing methods. Discover stealth mode operations and innovative approaches to WiFi communication. Gain insights into potential security implications and future developments in wireless networking technology.

The .11 Veil, Camouflage & Covert! Invisible WiFi, Revealed

BruCON Security Conference
Add to list