Wireless seepage

Photo of author

Tim Higgins

Last week’s Blackhat DC Briefings included a presentation by Errata Security on “Data Seepage”, most notably of the wireless kind. “Seepage” typically comes from chatty networking programs that broadcast information that can be used to launch exploits.

A slideshow of Errata’s presentation and a copy of their program, including source code and Windows exe file is available here.

Related posts

We’re baack…

If you've been following along with me on my web adventures, you know I've been here before. The last time that SmallNetBuilder graced the Etherwaves was Dec 31, 2003 and morphed into TomsNetworking the next day to start the new year.

Intel does the Right Thing

Tuesday's entry by Intel into the draft 11n market was a bit of a surprise, given its history with being late to the party with previous wireless LAN product generations. But the 11n train left the station awhile ago and Intel, like any other company wanting to stay in the WLAN game, had to get on board, draft status or not.

But aside from lending legitamacy to a technology that has so far been most notable for further decreasing the chance of an average consumer having a successful wireless networking experience, and for getting reviewers' and pundits' shorts in a knot (myself included), Intel did something else. Something that, in my opinion, they didn't play up enough in their announcement material or webcast / conference call, and that deserves special mention.

Jumped the gun on Netgear 11n Draft 2.0

Come to find out that the news item we posted the other day about Netgear releasing 802.11n Draft 2.0 firmware ...