Today the Lights, Tomorrow, The World.
The Internet of things [1] is defined as everyday objects being interconnected and networked. This includes smart-devices such as phones, to appliances like refrigerators that orders groceries online...
View ArticleAntennas, Gain and Security
One of the common misconceptions that people tend to have is that higher gain = better. This results in people blindly buying the highest dBi rating omnidirectional antennas they can get their hands...
View ArticleWireless Channel Hopping
Ever wondered how your devices like your laptop get the list of wireless networks available? First of all, you have to understand that at any point of time, a wireless card can only listen to one...
View Article802.11 network security – Tools of the trade
I thought why not shed some light on the tools that I have been using to play with the WiFi networks around me. Hopefully, we can get gather a collective discussion on what works and what do not and...
View ArticleWi-Fi–Hacking Neighbor From Hell Sentenced to 18 Years – Please do not be one...
A Minnesota hacker prosecutors described as a “depraved criminal” was handed an 18-year prison term Tuesday for unleashing a vendetta of cyberterror that turned his neighbors’ lives into a living...
View ArticleNeed Privacy?
Sometimes I use Tor when I am hooked up to a Wi-Fi connection or a network which I am not familiar with. Simply because relying only on Wi-Fi encryption to keep your information safe is simply not good...
View ArticleFiresheep – The weakest link in security has been, and always will be, the...
I came across this Firesheep article while I reading Crypto-Gram published on 15th July 2011 and thought that this was really interesting. The point to highlight in this article here is not the...
View ArticleHow would you Classify an APT?
Govware 2011 – Enterprise Security Track I had the privilege to be in one of the sessions conducted by SecureAge in the Enterprise Security track today. What aroused my interest was actually their...
View ArticleCreating a WPA wordlist for cracking using JTR (John the Ripper)
John the Ripper is an extraordinary tool that is useful for cracking passwords. First we must understand that using a word list is one of the ways to crack a WPA protected router. Rainbow tables can...
View ArticleNetcat – The Swiss Army Knife of Networking
1. Introduction to Netcat Netcat is a network service for reading and writing network connections using either TCP or UDP. It has the ability to create almost any kind of network connections and has...
View Article