IEEE 802.11 is a set of standards for wireless networking, commonly known as Wi-Fi, which is used in a variety of applications, from home networks to large-scale enterprise networks. This set of standards defines how wireless networks should be structured, enabling all compatible devices to communicate with each other. In addition, IEEE 802.11 also defines […]
Author: RF Security
Red Team Hardware Toolkit
The Red Team Hardware Toolkit provides the latest and most innovative tools to help you plan, create, and execute your next attack. Our toolkit features precision devices that allow you to test your security systems and gain access to sensitive information. With our tools, you can easily gain access to networks and systems, gather vital […]
SweynTooth vulnerabilities
SweynTooth critical vulnerabilities were found on Bluetooth Stack from some manufactors
WHID Elite: Open-Source Multi-Purpose Offensive Device
WHID Elite is a GSM-enabled Open-Source Multi-Purpose Offensive Device that allows a threat actor to remotely inject keystrokes, bypass air-gapped systems, conduct mousejacking attacks, do acoustic surveillance, RF replay attacks and much more. In practice, is THE Wet Dream of any Security Consultant out there! Original Product Description WHID Elite Features 2G/GSM Networks remote control […]
Read More “WHID Elite: Open-Source Multi-Purpose Offensive Device”
OWASP IoT Top 10 2018
Weak Guessable, or Hardcoded Passwords Insecure Network Services Insecure Ecosystem Interfaces Lack of Secure Update Mechanism Use of Insecure or Outdated Components Insufficient Privacy Protection Insecure Data Transfer and Storage Lack of Device Management Insecure Default Settings Lack of Physical Hardening https://owasp.org/www-pdf-archive/OWASP-IoT-Top-10-2018-final.pdf
Wireless Penetration Testing: Everything You Need to Know to Secure Your Network
Introduction to Wireless Penetration Testing Wireless penetration testing is a method to test an organization’s security. It is the process of gaining unauthorized access to the wireless network, data, and applications. The objective is to find any holes in the organization’s security architecture and devise tactics to help thwart attackers (Wireless Penetration Testing). Wireless penetration […]
Read More “Wireless Penetration Testing: Everything You Need to Know to Secure Your Network”
ZigBee Penetration Testing: Strengthen Your IoT Security 2023
Protect your IoT devices with powerful ZigBee penetration testing techniques. Discover how to secure your network and prevent potential attacks today.
[Free] Bluetooth Penetration Testing Fundamentals: Part 1
This article (Bluetooth Penetration Testing Fundamentals) attempts to give an overview of the technology, terms, and security that are built into Bluetooth. I hope this will allow you to get started in hacking Bluetooth without getting bogged down by too much technical detail. Before starting any hacking tutorials, you need to understand the technology. To […]
Read More “[Free] Bluetooth Penetration Testing Fundamentals: Part 1”
Free GSM Penetration Testing Fundamentals: Part 1
Stay one step ahead of potential attacks with GSM penetration testing. Discover how to fortify your network and ensure maximum security today.
GIAC Assessing and Auditing Wireless Networks (GAWN)
The GIAC Assessing and Auditing Wireless Networks GAWN certification is created to security professionals who need to learn and gain experience on wireless networks security. This certification focuses on different wireless technologies I will try to explain each topic and recommend the best hardware on the market to engage into wireless security attacks. Areas Covered […]
Read More “GIAC Assessing and Auditing Wireless Networks (GAWN)”