Beginner's Guide to Wireless Auditing

by David Maynor
Sept. 15, 2017 1 comment Symantec Pen Testing & Audits

Since our talks at Black Hat Vegas and DEFCON, Jon Ellch and I have been peppered with questions regarding how to find vulnerabilities in wireless device drivers and the specific techniques that were employed. Rather than answer these questions one at a time, an article seemed a better course of action. In this first article, we will discuss how to build an auditing environment, how to construct fuzzing tools and, finally, how to interpret the results.

https://www.symantec.com/connect/articles/beginners-guide-wireless-auditing

Avatar
Steven Ulm 2 months, 4 weeks ago

A great start in reading about the Wireless Auditing! I shared it on my LinkedIn profile as well.

Reply