Wireless Hacking
The procedures and programs available on this webpage are legal, however they can be misused.
Therefore, the IIRG and NEWD disclaim any liability from any damages or injuries of any type that the reader or
user of information contained on this webpage may encounter from the use of said information.


Use this information and any end product at your own risk!

The Definitive Guide To Wireless WarX'ing                                                           Wireless is Not the Problem

Wardriving HOWTO (Un-official)                                                                         802.11a: An Excellent Long Term Solution

FBI releases advisory about 802.11-spotting "wardriving"                                      802.11 Alphabet Soup

(In)Security of the WEP algorithm
                                                                               802.11 Security Beyond WEP

Unsafe at any key size; An analysis of the WEP encapsulation                                802.11 WEP: Concepts and Vulnerability

An Initial Security Analysis of the IEEE 802.1X Standard                                      Hacking Exposed - Chapter 10 - Wireless Security

Wireless Networking: Compromising Security for Convenience?                           Assigning 802.11b Access Point Channels

Cisco Aironet Wireless Lan Security                                                                     Assess Requirements Before Designing WLAN

A Guide to War Driving and Detecting War Drivers                                              Wireless Access Points and ARP Poisoning

Unsafe at any key size; An analysis of the WEP encapsulation                               A Beginners Guide To Wireless Security

White Paper: Best Practices for Deploying Wireless LANs                                  IEEE 802.1X Pre-Authentication  (Slides)

Configuring a FreeBSD Access Point for your Wireless Network[cfreebsdwireless.txt - MISSING]                          It Is Only Dialtone

Wireless Computing – A Technological Breakthrough Laden with Risk?                EIRP Limitations for 802.11 WLANs[eirp802.11.txt - MISSING]

Wired Equivalent Privacy Vulnerability                                                                  Getting the most out of WEP

Analysis of WLAN Discovery Applications for Intrusion Detection                        Wireless LAN in London

Link Layer and Network Layer Security for Wireless Networks                            Minimizing 802.11 Interference Issues[m802.11ii.txt - MISSING]

Wireless Honeypots                                                                                              Security in a Wireless World

Sizing Up Your WLAN                                                                                        Orinoco Technical Bulletin - WEP Encryption


Return to The IIRG