{"id":247,"date":"2005-04-17T04:53:09","date_gmt":"2005-04-17T09:53:09","guid":{"rendered":"https:\/\/www.suramya.com\/blog\/2005\/04\/17\/wireless-lan-security-resources\/"},"modified":"2022-06-16T15:18:11","modified_gmt":"2022-06-16T09:48:11","slug":"wireless-lan-security-resources","status":"publish","type":"post","link":"https:\/\/www.suramya.com\/blog\/2005\/04\/wireless-lan-security-resources\/","title":{"rendered":"Wireless LAN Security resources"},"content":{"rendered":"\n<p>These are links to various sites that have information on Wireless LAN security. If you know of any other sites let me know and I will add them here.<\/p>\n<p><a href='http:\/\/www.drizzle.com\/~aboba\/IEEE\/'>Wireless security papers<\/a>:<br \/>\n   Lists a lot of papers on wireless security<\/p>\n<p><a href='http:\/\/www.wardriving.com\/'>Wardriving.com<\/a>:<br \/>\n   Has a lot of resources on Wardriving and how to protect against it<\/p>\n<p><a href='http:\/\/wifinetnews.com'>Wi-Fi Networking News<\/a>:<br \/>\n   Wi-Fi Networking News covers high-speed wireless networking and communications, focusing on Wi-Fi and related specifications.<\/p>\n<p><a href='http:\/\/www.wi-fiplanet.com\/'>Wi-Fi Planet<\/a>:<br \/>\n   A good source for Wi-Fi news<\/p>\n<p><a href='http:\/\/infopeople.org\/resources\/security\/network\/wireless.html'>Securing Wireless Networks<\/a>:<br \/>\n   A good article on how to secure wireless networks<\/p>\n<p><a href='http:\/\/www.securityfocus.com\/infocus\/1742'>Wireless Intrusion Detection Systems<\/a>:<br \/>\n   Information on how to setup a Wireless Intrusion Detection system.<\/p>\n<p><a href='http:\/\/www.bitpipe.com\/data\/detail?id=1048164797_625&amp;type=RES&amp;src=KA_RES'>Wireless LAN Policies for Security &amp;Management<\/a>:<br \/>\n   An interesting paper on setting up Wireless LAN security policies.<\/p>\n<p><a href='http:\/\/www.inventati.info\/pub\/defcon11\/Beetle\/'>Airsnarf<\/a>:<br \/>\n   Airsnarf is a simple rogue wireless access point setup utility designed to demonstrate how a rogue AP can steal usernames and passwords from public wireless hotspots<\/p>\n<p><a href='http:\/\/www.wi-fi.org\/OpenSection\/protected_access.asp'>WPA2 (Wi-Fi Protected Access 2)<\/a>:<br \/>\n   WPA2 is the second generation of WPA security; providing enterprise and consumer Wi-Fi\u00c3\u201a\u00c2\u00ae users with a high level of assurance that only authorized users can access their wireless networks<\/p>\n<p>&#8211; Suramya<\/p>\n","protected":false},"excerpt":{"rendered":"<p>These are links to various sites that have information on Wireless LAN security. If you know of any other sites let me know and I will add them here. Wireless security papers: Lists a lot of papers on wireless security Wardriving.com: Has a lot of resources on Wardriving and how to protect against it Wi-Fi [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[20,17,2],"tags":[],"class_list":["post-247","post","type-post","status-publish","format-standard","hentry","category-security-toolsapps","category-security-tutorials","category-techie-stuff"],"_links":{"self":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts\/247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/comments?post=247"}],"version-history":[{"count":1,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts\/247\/revisions"}],"predecessor-version":[{"id":5044,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts\/247\/revisions\/5044"}],"wp:attachment":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/media?parent=247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/categories?post=247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/tags?post=247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}