background preloader

WiGLE - Wireless Geographic Logging Engine - Plotting WiFi on Maps

WiGLE - Wireless Geographic Logging Engine - Plotting WiFi on Maps
news: Congrats to user 'fenebrae', our 150,000th user! Netstumble proud! Users make this whole thing possible -bobzilla Come find us at BSides SF security conference at DNA Lounge today and tommorow, then at Trustycon on Thursday!

https://wigle.net/

Related:  OSINTWireless TOOLSsecurity & intelÉlectromagnétismenet toolz

Midnight Research Labs - SEAT SEAT aaron posted in on August 23rd, 2006 Project Info :: Features :: Screenshots :: Videos :: Downloads :: Documentation :: Developers :: WIKI Project info: SEAT (Search Engine Assessment Tool) is the next generation information digging application geared toward the needs of security professionals. OSX : inSSIDer Scan the Wi-Fi networks around you and track their signal strength over time. inSSIDer scans all the Wi-Fi networks within the reach of your computer’s wireless card, tracks their signal strength over time, and determines their security settings. Track open or secure wireless networks.

SCADApedia A blog is great for providing current information, but this information tends to age off and lose value over time. Our answer to this problem is the SCADApedia. The SCADApedia is a set of pages covering topics of importance in ICS and control system IT. Update: Spy agencies hacked SIM card maker's encryption U.S. and U.K. intelligence agencies have reportedly hacked into the computer network of giant SIM card maker Gemalto and taken smartphone encryption keys potentially used by customers of hundreds of mobile phone carriers worldwide. The Gemalto hack, by the U.S. National Security Agency and the U.K.

Chanalyzer Wi-Spy + Chanalyzer 5NEW! Pain Relief for Wi-Fi Headaches Now with 802.11ac support! Wi-Fi has revolutionized the way we work. Search WikiLeaks 2. Act normal If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. Cyber Threats against the Aviation Industry Introduction The recent incident to the Malaysia Airlines Flight MH370 is fueling the discussion of whether would be possible to hack into an airplane and gain complete control control of on-board systems, excluding the pilots. In the past, we have seen many security experts present possible attack scenarios, but never has an attacker made them reality. While the investigators still search for evidence that can provide more indications of what is really happened to the flight, some security experts also hypothesized that it could be the result of a cyber attack against the airplane. Some experts alerted to the possibility that it could be an attack against the in-flight entertainment system that allowed the hackers to infiltrate the security software. The theory was exposed by a British anti-terrorism expert who declared that similar attacks are possible due to the existence of specific exploits.

Eye P.A.: Visual Packet Analysis Go into detail with the Packets Tab In Eye P.A.’s Packets Tab, you’ll find a table that breaks down the packet traffic in your capture as it happened. Being able to see the RSSI, Data Rate, and other specific packet-level details provides even more insight into the cause of a WLAN’s problems. Derbycon 2015 - Blue Team Starter Kit Description: A look at some of the low-cost tools that can be utilized by Blue Team members. Tools include Redline for forensics, EMET for computer hardening, Zed Attack Proxy for web application security, and PDQ Deploy and Inventory for third party patch management. Descriptions of each tool, experiences and how I've used each of these tools, and short demos of each tool. U.S.

Guide to building the Tastic RFID Thief The Tastic RFID Thief has been around since late 2013, and since I've had a tremendous amount of requests asking how to build it, I thought that this blog post would be of justice to the tastic. About the Tastic RFID Thief The Tastic RFID Thief was introduced by the company Bishop Fox through a series of Defcon and Blackhat videos across mid-late 2013. Bishop Fox describe the Tastic silent, long-range RFID reader that can steal the proximity badge information from an unsuspecting employee as they physically walk near this concealed device. I built my first Tastic RFID Thief in February 2014, with no experience in electronics, and as a total challenge given to me by my boss at the time.

AirMagnet Archived Webinars Archived Webinars Surveys shouldn't just be for pre-deployment any longer. This webinar covers how to use AirMagnet's SurveyPro to make sure your Wireless LAN design meets or exceeds the initial design parameters. Brandieself added: March, 2015 A lot of people contact us and ask: What are your preferred tools for Pentesting and which ones are free? Whilst there are hundreds and thousands of free Pentesting tools around, we seem to use only a core bunch of them as many have similar functionality. Some people may prefer one tool over another, but the bottom line is: There are many tools to achieve the same goal. Here is our personal list of preferred tools, which does by no means indicate that those are the only ones to use.

Wireless Technologies: For an Informed and Responsible Debate Guided by Sound Science / Technologies radiofréquences : pour un débat responsable et éduqué guidé par la démarche scientifique - Activism - Petition Online Canada (A French version will follow) Open Letter to the Public We are a group of scientists and engineers who are concerned about the perception of health risks from electromagnetic radiation in the frequency range 3kHz to 300GHz (henceforth called “radiofrequencies” and/or RF) in Quebec and elsewhere in the world.

Related:  Wi FiUseful Sites