YoVDO

The .11 Veil, Camouflage & Covert! Invisible WiFi, Revealed

Offered By: BruCON Security Conference via YouTube

Tags

BruCON Courses Cybersecurity Courses Covert Communication Courses

Course Description

Overview

Explore the hidden world of WiFi communication in this 45-minute conference talk from BruCON Security Conference. Delve into the intricacies of code communication, examining case studies and analyzing various aspects of WiFi protocols. Investigate probe requests and responses, beacon frames, and information elements. Uncover techniques for detecting suspicious activity and malware outbreaks. Learn about deep packet inspection, frame retrieval, and sequencing methods. Discover stealth mode operations and innovative approaches to WiFi communication. Gain insights into potential security implications and future developments in wireless networking technology.

Syllabus

Intro
Introduction
What is Code Communication
Case Study
Probe Request Response
Beacon Frame
Beacon Frame Parameters
Probe Requests Response
Information Element
Beacons
Suspicious Eye
Outbreak of Malware
Partial Virtual Bitmap
Probe Request
Python Script
Traffic Indication Map
Deep Packet Inspection
Retrieving Lost Frames
Sequencing
Encoding
Stealth Mode
The Third Approach
Inspiration
Test Case
Version Field
Spin
Advantages
Learnings
Potential Approaches
Conclusion


Taught by

BruCON Security Conference

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network