KRACK Vulnerability

There are already quite a number of blogs going into detail about the KRACK, I wont go into detail about the actual vulnerability, feel free to look over the links provided below: https://www.krackattacks.com Andrew von Nagy's - Revolution WiFI Blog Twitter #KRACK The question I will propose is how in future do we manage getting …

Continue reading KRACK Vulnerability

Advertisements

Conducting An Outdoor Site Survey Using Ekahau With A GPS Receiver.

Have you ever had to conduct a site survey for an outdoor area, it might be fine if only a very small area, clicking everywhere you stand/ walk, but imagine doing a city block or a mine site, this would be come very hard to manage. This is why site survey software normally supports a …

Continue reading Conducting An Outdoor Site Survey Using Ekahau With A GPS Receiver.

CWNA Chapter 20 – Bring Your Own Device (BYOD)

My Notes from chapter 20 of the CWNA study guide Mobile Device Management Company-issued devices versus personal devices An MDM solution can be used to manage both company-issued devices and personal devices. the management of CID and BYOD is quite different. The management strategy for company mobile devices usually entails more in-depth security because very …

Continue reading CWNA Chapter 20 – Bring Your Own Device (BYOD)

CWNA Chapter 19 – Very High Throughput (VHT) and 802.11ac

My Notes from chapter 19 of the CWNA study guide 802.11ac-2013 amendment 802.11ac technology does not operate in the 2.4 GHz ISM band, only the 5 GHz U-NII bands. 5 GHz only 802.11ac expands channel widths even further than 802.11n, with channel widths of 80 MHz and 160 MHz. Due to the limited frequency space …

Continue reading CWNA Chapter 19 – Very High Throughput (VHT) and 802.11ac