User Tools

Site Tools


main

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
main [2017/01/21 03:49]
mister_x BlackHat USA training
main [2017/10/17 05:28] (current)
mister_x [News] Blog post: KRACK WPA Vulnerability - Key Reinstallation AttaCK
Line 32: Line 32:
  
 ^Date^Title^Content^ ^Date^Title^Content^
-^20 Jan 2017|BlackHat USA training|I'm really pleased to announce that Vivek Ramachandran and I will be teaching ​[[https://www.blackhat.com/us-17/training/advanced-wireless-exploitation.html|Advanced Wireless Exploitation]] at BlackHat USA this summer.| +^16 Oct 2017|Blog post: KRACK WPA Vulnerability - Key Reinstallation AttaCK|In [[https://aircrack-ng.blogspot.com/2017/10/krack-wpa-vulnerability-key.html|this blog post]], the new KRACK vulnerability is explained: a brief summarywho's affected, what to do and links to resources related to the vulnerability. \\ \\ TL;DR: Another day, another vulnerability,​ just patch your systems. ​It allows decryption ​of traffic but does not disclose ​the WPA key.
-^30 Nov 16|Wireless Pawn Edition (WPE) patches updated|If you want to attack WPA Enterpriseapplying WPE patches to HostAPd or Freeradius would do the job. Howeverthey haven't been updated in a long time and still used old software versions (HostAPd 2.2 and Freeradius 2.1 which is EOL). \\ \\ It is no longer the case as they are now available for the latest and greatest version ​of HostAPd and Freeradius. We took the job upon ourselves to update them and keep updating them whenever a new versions get releasedThe icing on the cake is that both of them are available as packages in Kali and a tutorial for HostAPd-WPE has been created\\ \\ All the details as well as a link to the patches can be found in [[https://www.offensive-security.com/penetration-testing/hacking-wpa-enterprise-with-kali-linux/|this blog post]].|+^16 Aug 2017|Blog post: On drivers, rtl8812au, WN722N, monitor mode, QCA6174, other news ...|In [[https://aircrack-ng.blogspot.com/2017/08/on-drivers-rtl8812au-wn722n-monitor.html|this blog post]], we answer some common questions regarding various topics: using drivers, driver development,​ embedded chipsets, 802.11n/ac capture/​injection,​ a few different current chipsets/​drivers (rtl8812au, ath9k_htc, QCA6174), linux-backports (aka compat-wireless) and some other good news.|
  
-[[morenews|More news...]] ​+[[morenews|More news...]]
 ====== Download ====== ====== Download ======
  
 ===== Current version ===== ===== Current version =====
  
-Latest version: 1.2 RC 3+Latest version: 1.2 RC 4
  
-  * [[http://​download.aircrack-ng.org/​aircrack-ng-1.2-rc3.tar.gz|Linux]] ([[http://​patches.aircrack-ng.org/​|Driver patches]])+  * [[http://​download.aircrack-ng.org/​aircrack-ng-1.2-rc4.tar.gz|Linux]] ([[http://​patches.aircrack-ng.org/​|Driver patches]])
  
 ** IMPORTANT ** Information Regarding Windows Version ** IMPORTANT **\\ ** IMPORTANT ** Information Regarding Windows Version ** IMPORTANT **\\
main.1484966969.txt.gz · Last modified: 2017/01/21 03:49 by mister_x