The .11 Veil, Camouflage & Covert! Invisible WiFi, Revealed
Offered By: BruCON Security Conference via YouTube
Course Description
Overview
Explore the hidden world of WiFi communication in this 45-minute conference talk from BruCON Security Conference. Delve into the intricacies of code communication, examining case studies and analyzing various aspects of WiFi protocols. Investigate probe requests and responses, beacon frames, and information elements. Uncover techniques for detecting suspicious activity and malware outbreaks. Learn about deep packet inspection, frame retrieval, and sequencing methods. Discover stealth mode operations and innovative approaches to WiFi communication. Gain insights into potential security implications and future developments in wireless networking technology.
Syllabus
Intro
Introduction
What is Code Communication
Case Study
Probe Request Response
Beacon Frame
Beacon Frame Parameters
Probe Requests Response
Information Element
Beacons
Suspicious Eye
Outbreak of Malware
Partial Virtual Bitmap
Probe Request
Python Script
Traffic Indication Map
Deep Packet Inspection
Retrieving Lost Frames
Sequencing
Encoding
Stealth Mode
The Third Approach
Inspiration
Test Case
Version Field
Spin
Advantages
Learnings
Potential Approaches
Conclusion
Taught by
BruCON Security Conference
Related Courses
Ghost Tunnel 2.0 - Blue GhostHack In The Box Security Conference via YouTube Hiding a Secret Distributed Chat System in 802.11 Management Frames
Hack In The Box Security Conference via YouTube Unexpected Shells with "covertutils"
DefCamp via YouTube Matrioshka SIGINT - Análisis de señales ocultas - Radio Space
Ekoparty Security Conference via YouTube Models of Identity Signaling
Santa Fe Institute via YouTube