Questions tagged [wireless]

Wireless security topics including 802.11, Bluetooth, and others.

Wireless security topics related to wireless systems like 802.11, Bluetooth, cellular, etc. Relevant topics (by wireless system) below:

802.11 WiFi

  • WEP
  • WPA
  • WPA2
  • WPA3
  • WPS
  • various attacks against the above, such as Evil Twin, brute force, etc.

cellular wireless systems

  • GSM
  • UMTS
  • LTE
  • 5G
  • various attacks against the above, such as rogue GSM base stations
466 questions
258
votes
5 answers

Consequences of the WPA2 KRACK attack

Today new research was published on vulnerabilities in wireless network security called Krack. What are the real-world consequences of these attacks for users and owners of wireless networks, what can an attacker actually do to you? Also is there…
Rory McCune
  • 60,923
  • 14
  • 136
  • 217
152
votes
3 answers

Does pressing a car remote many times offer denial of service attack for rolling codes?

My understanding of remote car key fobs, and similar security devices with rolling codes, is that the key device is a transmitter that, each time the button is pressed, sends the next secret in a known sequence that is unique to the key. It does not…
Oddthinking
  • 1,767
  • 3
  • 15
  • 17
119
votes
3 answers

Why wasn't the KRACK exploit discovered sooner?

From what I've read, the issue is as simple as performing step 3 of a 4-step handshake and the consequences of performing that step more than once. Considering the complexity of these kinds of algorithms, I'm somewhat surprised that it is so…
Dave Cousineau
  • 880
  • 2
  • 7
  • 9
115
votes
6 answers

What would one need to do in order to hijack a satellite?

I realise this borders on sci-fi, but there's been some interesting demonstrations regarding security of various satellites. What would be required to hack a satellite (in general terms, any hack really)? Are they all basically connected in the…
Incognito
  • 5,204
  • 5
  • 27
  • 31
82
votes
7 answers

Company claims hardwire connections are a security issue

Someone to whom I am related is at a study camp for their desired profession. This person, let's call her Jane, is supposed to be studying rigorously for two months. The housing provided offers wireless internet connections, which are spotty and…
Erin B
  • 802
  • 1
  • 6
  • 9
80
votes
17 answers

Trying to keep high school students out of the Wi-Fi network

I'm a teacher and IT person at a small K-12 school. The students are not supposed to have phones, laptops or access to the network. However, students being students they will try to find a way around the rules. The students manage to acquire the…
Dave McQueen
  • 817
  • 1
  • 6
  • 4
78
votes
7 answers

How to patch "keyless entry" car keys?

The German automobile club ADAC did a test with several cars which open doors and start the engine with a "keyless entry" system. You don't have to push a button on your car key. If you get near your car, key and car will recognise each other. If…
honze
  • 1,106
  • 1
  • 8
  • 19
65
votes
6 answers

If someone hacks my wi-fi password, what can they see and how?

If someone knows my wifi password (be it WEP or WPA) what can they see? Do they just see URLs I visit, or can they see everything in my browser, or even everything I do on my computer? Does using HTTPS make any difference? Secondly, If the attacker…
user20378
  • 653
  • 1
  • 6
  • 5
52
votes
6 answers

Phones broadcast the SSIDs of all networks they have ever connected to. How can these be obtained by an attacker?

I just watched an interesting talk from Glen Glenn Wilkinson titled: The Machines that Betrayed their Masters. He said that your phone is constantly broadcasting all the SSIDs it has ever connected to. How would an attacker be able to capture these…
that guy
  • 668
  • 1
  • 6
  • 9
51
votes
1 answer

Vehicle remote key security

How secure are car remote keys? When you lock or unlock your car, can someone spoof or make another remote key? How do car remote keys work? Do they use some kind of private/public keys, encryption? Are aftermarket alarm remote keys less secure than…
Guntis
  • 745
  • 2
  • 7
  • 9
50
votes
7 answers

How would you detect an Evil Twin attack, especially in a new environment?

Let's say you are traveling, and you pause in the airport lounge, or your hotel lobby, or a nearby coffee shop. You haul out your laptop and scan the available wireless networks. You know the name of the wireless network because it is written behind…
J Kimball
  • 2,137
  • 1
  • 13
  • 19
50
votes
6 answers

How safe are wifi enabled talking toys?

There have been ads on the radio recently for a wifi enabled toy called Talkies, which are advertised as being able to communicate with app enabled phones, with a "trusted circle" that other phones can be added to. (Obligatory photo of a cute wifi…
JohnP
  • 611
  • 1
  • 6
  • 11
43
votes
3 answers

What is the best home wireless network encryption algorithm to use?

What is the best home wireless network encryption algorithm to use? I realize the best answer will probably change over time, and hopefully people can provide updated answers as new standards come out. So far, my knowledge, as of early 2015…
Jonathan
  • 3,157
  • 4
  • 26
  • 42
42
votes
2 answers

What is the difference between Promiscuous and Monitor Mode in Wireless Networks?

In Wireless Networks, you can put your wireless card in Promiscuous or in Monitor Mode. What is the difference between these two modes ?
Vladimir Leiv
  • 897
  • 3
  • 8
  • 14
32
votes
6 answers

Is UPnP still insecure?

In today's world, on equipment that is properly updated to the latest software/firmware, is UPnP still insecure, or have its vulnerabilities been fixed?
Daniel
  • 371
  • 1
  • 3
  • 4
1
2 3
31 32