Overview
Explore the hidden world of WiFi communication in this 45-minute conference talk from BruCON Security Conference. Delve into the intricacies of code communication, examining case studies and analyzing various aspects of WiFi protocols. Investigate probe requests and responses, beacon frames, and information elements. Uncover techniques for detecting suspicious activity and malware outbreaks. Learn about deep packet inspection, frame retrieval, and sequencing methods. Discover stealth mode operations and innovative approaches to WiFi communication. Gain insights into potential security implications and future developments in wireless networking technology.
Syllabus
Intro
Introduction
What is Code Communication
Case Study
Probe Request Response
Beacon Frame
Beacon Frame Parameters
Probe Requests Response
Information Element
Beacons
Suspicious Eye
Outbreak of Malware
Partial Virtual Bitmap
Probe Request
Python Script
Traffic Indication Map
Deep Packet Inspection
Retrieving Lost Frames
Sequencing
Encoding
Stealth Mode
The Third Approach
Inspiration
Test Case
Version Field
Spin
Advantages
Learnings
Potential Approaches
Conclusion
Taught by
BruCON Security Conference