Wireless links, bibliography

Attacks

  • (In)security in the WEP algorithm
  • Security Issues Surrounding Wired Equivalent Privacy
  • PPTP security issue
  • I-087: Microsoft PPTP Security Vulnerabilities
  • Authentication Vulnerabilities in IKE and Xauth with weak keys
  • Securing

  • Isolating and Securing Wireless LANs (SANS)
  • Cheap Wireless Security for Unix - SSH Tunnel to a Proxy
  • Misc

  • Luxembourg map after wardriving.