Chapter 6 – Attacking Access Points and the Infrastructure
- The Wi-Fi Protected Setup documentation available at http://www.wi-fi.org/discover-wi-fi/wi-fi-protected-setup
- The Pixie-Dust attack against Wi-Fi Protected Setup available at http://archive.hack.lu/2014/Hacklu2014_offline_bruteforce_attack_on_wps.pdf
- Reaver available at https://code.google.com/p/reaver-wps/
- Recommendation for EAP Methods Used in Wireless Network Access Authentication, NIST SP, 800-120, available at http://csrc.nist.gov/publications/nistpubs/800-120/sp800-120.pdf
- The MDK3 tool available at http://aspj.aircrack-ng.org/#mdk3
- The Airbase-ng documentation available at http://www.aircrack-ng.org/doku.php?id=airbase-ng
- Hydra available at https://www.thc.org/thc-hydra/
- Protecting Browsers from DNS Rebinding Attacks, Stanford Web Security Research, http://crypto.stanford.edu/dns/
- Heffner, Craig, Remote Attacks Against SOHO Routers, https://media.blackhat.com/bh-us-10/whitepapers/Heffner/BlackHat-USA-2010-Heffner-How-to-Hack...