Wi-Fi is a Passion


Overview - WIDS and WIPS

As you probably know, there are multiple attacks possible in the wireless world. To detect and prevent those attacks there are monitor tools like a wireless intrusion detection system (WIDS). The best solution for attacks is to prevent them. With wir... <read more>

WIDS and WIPS analysis and monitoring

In the overview WIDS/WIPS blog, I wrote of four analysis methods from the server used to collect data:
- Signature analysis looks for patterns.
- Behaviour analysis looks for anomalies.
- Protocol analysis analyses the MAC layer... <read more>

Rogue detection and mitigation

A WIDS/WIPS can do device classification and recognize devices such as access points, client stations, and ad hoc clients, as long as those devices are within range of the sensors. When the devices are scanned and recognized the devices will be class... <read more>

Older blogs:

Overview - Roaming
Key Caching
Fast Secure Roaming
Fast BSS Transition
Overview - Encryption
Encryption Methods
Authentication and Key Management
Aruba event
WLAN Security Infrastructures VPN and Management
WLAN Security Infrastructures terms
WLAN Security Infrastructures Architectures
2.4GHz is not dead
per-user PSK and SAE
PSK Authentication
Overview - LDAP and RADIUS
EAP Authentication
Overview - Authentication
Security Policies
Wi-Fi Home Design
Network Attacks
Legacy Security
Legacy Encryption
Legacy Authentication
Overview - Security
Wireless a shared medium with a high throughput?
Preparation CWAP
Common Wireless issues
Common Wired issues
Spectrum Analyses
RF Math (2)
RF Math (1)
Protocol Analyses
Security - WPA2-Enterprise
Security - WPA2-Personal
Frames - Data
Frames - Control
Frames - Management (2)
Frames - Management (1)
MAC Layer - QoS
MAC Layer - Frame Control
MAC Layer - Header
PHY Layer
Overview - Architectures
Overview - Authentication
Overview - Troubleshooting