Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

The .11 Veil, Camouflage & Covert! Invisible WiFi, Revealed

BruCON Security Conference via YouTube

Overview

Explore the hidden world of WiFi communication in this 45-minute conference talk from BruCON Security Conference. Delve into the intricacies of code communication, examining case studies and analyzing various aspects of WiFi protocols. Investigate probe requests and responses, beacon frames, and information elements. Uncover techniques for detecting suspicious activity and malware outbreaks. Learn about deep packet inspection, frame retrieval, and sequencing methods. Discover stealth mode operations and innovative approaches to WiFi communication. Gain insights into potential security implications and future developments in wireless networking technology.

Syllabus

Intro
Introduction
What is Code Communication
Case Study
Probe Request Response
Beacon Frame
Beacon Frame Parameters
Probe Requests Response
Information Element
Beacons
Suspicious Eye
Outbreak of Malware
Partial Virtual Bitmap
Probe Request
Python Script
Traffic Indication Map
Deep Packet Inspection
Retrieving Lost Frames
Sequencing
Encoding
Stealth Mode
The Third Approach
Inspiration
Test Case
Version Field
Spin
Advantages
Learnings
Potential Approaches
Conclusion

Taught by

BruCON Security Conference

Reviews

Start your review of The .11 Veil, Camouflage & Covert! Invisible WiFi, Revealed

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.