<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Wifi and FRAGAttacks in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Wifi-and-FRAGAttacks/m-p/45470#M5455</link>
    <description>&lt;P&gt;Saw this on hackernews and thought oh no not again!&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 13 May 2021 17:14:43 GMT</pubDate>
    <dc:creator>Steve-Wilme</dc:creator>
    <dc:date>2021-05-13T17:14:43Z</dc:date>
    <item>
      <title>Wifi and FRAGAttacks</title>
      <link>https://community.isc2.org/t5/Industry-News/Wifi-and-FRAGAttacks/m-p/45451#M5452</link>
      <description>&lt;P&gt;Right.&amp;nbsp; You might want to pay attention to this one, since it's inherent in the protocol ("Come and see the insecurity inherent in the system!"), and affects pretty much every version and implementation of wifi.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's called &lt;A href="https://www.fragattacks.com/" target="_blank" rel="noopener"&gt;FRAGAttacks&lt;/A&gt; (FRagmentation and AGgregation attacks).&amp;nbsp; It's not a single vulnerability, but lots of them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The &lt;A href="https://github.com/vanhoefm/fragattacks" target="_blank" rel="noopener"&gt;issues&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md" target="_blank" rel="noopener"&gt;Twelve specific flaws&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://thehackernews.com/2021/05/nearly-all-wifi-devices-are-vulnerable.html" target="_blank"&gt;https://thehackernews.com/2021/05/nearly-all-wifi-devices-are-vulnerable.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(Shades of 5G ...)&lt;/P&gt;</description>
      <pubDate>Wed, 12 May 2021 22:38:37 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Wifi-and-FRAGAttacks/m-p/45451#M5452</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2021-05-12T22:38:37Z</dc:date>
    </item>
    <item>
      <title>Re: Wifi and FRAGAttacks</title>
      <link>https://community.isc2.org/t5/Industry-News/Wifi-and-FRAGAttacks/m-p/45455#M5453</link>
      <description>Great post! I was not aware of this vulnerability in WiFi. Apparently WiFi aggregates frames into larger ones to improve efficiency. In order for the receiving system to know if the frame is aggregated there is a flag in the header that is either set to true or false. The problem is that this flag can be manipulated. By setting the flag of a non aggregated frame to true, malicious frames could be aggregated to this frame.&lt;BR /&gt;Thanks again for posting this, it was the most interesting thing I learned today.&lt;BR /&gt;&lt;BR /&gt;Alex</description>
      <pubDate>Thu, 13 May 2021 03:46:39 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Wifi-and-FRAGAttacks/m-p/45455#M5453</guid>
      <dc:creator>alekos</dc:creator>
      <dc:date>2021-05-13T03:46:39Z</dc:date>
    </item>
    <item>
      <title>Re: Wifi and FRAGAttacks</title>
      <link>https://community.isc2.org/t5/Industry-News/Wifi-and-FRAGAttacks/m-p/45470#M5455</link>
      <description>&lt;P&gt;Saw this on hackernews and thought oh no not again!&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 May 2021 17:14:43 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Wifi-and-FRAGAttacks/m-p/45470#M5455</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2021-05-13T17:14:43Z</dc:date>
    </item>
    <item>
      <title>Re: Wifi and FRAGAttacks</title>
      <link>https://community.isc2.org/t5/Industry-News/Wifi-and-FRAGAttacks/m-p/45471#M5456</link>
      <description>&amp;gt; alekos (Newcomer II) posted a new reply in Industry News on 05-12-2021 11:46 PM&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Thanks again for posting this, it was&lt;BR /&gt;&amp;gt; the most interesting thing I learned today.&lt;BR /&gt;&lt;BR /&gt;Thank you for those kinds words, and quite welcome. Always happy to help.&lt;BR /&gt;&lt;BR /&gt;(In other news, the latest report on the Colonial pipeline issue that I have heard&lt;BR /&gt;(but not yet been able to verify) is that the ransomware attack is *not* what shut&lt;BR /&gt;it down: Colonial ceased pumping because of concerns that they wouldn't be able&lt;BR /&gt;to *BILL* customers properly ...)&lt;BR /&gt;&lt;BR /&gt;======================&lt;BR /&gt;rslade@gmail.com rmslade@outlook.com rslade@computercrime.org&lt;BR /&gt;"If you do buy a computer, don't turn it on." - Richards' 2nd Law&lt;BR /&gt;"Robert Slade's Guide to Computer Viruses" 0-387-94663-2&lt;BR /&gt;"Viruses Revealed" 0-07-213090-3&lt;BR /&gt;"Software Forensics" 0-07-142804-6&lt;BR /&gt;"Dictionary of Information Security" Syngress 1-59749-115-2&lt;BR /&gt;"Cybersecurity Lessons from CoVID-19" CRC Press 978-0-367-68269-9&lt;BR /&gt;============= for back issues:&lt;BR /&gt;[Base URL] site &lt;A href="http://victoria.tc.ca/techrev/" target="_blank"&gt;http://victoria.tc.ca/techrev/&lt;/A&gt;&lt;BR /&gt;CISSP refs: [Base URL]mnbksccd.htm&lt;BR /&gt;PC Security: [Base URL]mnvrrvsc.htm&lt;BR /&gt;Security Dict.: [Base URL]secgloss.htm&lt;BR /&gt;Security Educ.: [Base URL]comseced.htm&lt;BR /&gt;Book reviews: [Base URL]mnbk.htm&lt;BR /&gt;[Base URL]review.htm&lt;BR /&gt;Partial/recent: &lt;A href="http://groups.yahoo.com/group/techbooks/" target="_blank"&gt;http://groups.yahoo.com/group/techbooks/&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://en.wikipedia.org/wiki/Robert_Slade" target="_blank"&gt;http://en.wikipedia.org/wiki/Robert_Slade&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank"&gt;https://is.gd/RotlWB&lt;/A&gt; &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;</description>
      <pubDate>Thu, 13 May 2021 17:17:30 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Wifi-and-FRAGAttacks/m-p/45471#M5456</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2021-05-13T17:17:30Z</dc:date>
    </item>
    <item>
      <title>Re: Wifi and FRAGAttacks</title>
      <link>https://community.isc2.org/t5/Industry-News/Wifi-and-FRAGAttacks/m-p/45475#M5459</link>
      <description>&amp;gt; Steve-Wilme (Advocate I) posted a new reply in Industry News on 05-13-2021 01:14&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Saw this on hackernews and thought oh no not again!&lt;BR /&gt;&lt;BR /&gt;Teardrop lives!&lt;BR /&gt;&lt;BR /&gt;======================&lt;BR /&gt;rslade@gmail.com rmslade@outlook.com rslade@computercrime.org&lt;BR /&gt;"If you do buy a computer, don't turn it on." - Richards' 2nd Law&lt;BR /&gt;"Robert Slade's Guide to Computer Viruses" 0-387-94663-2&lt;BR /&gt;"Viruses Revealed" 0-07-213090-3&lt;BR /&gt;"Software Forensics" 0-07-142804-6&lt;BR /&gt;"Dictionary of Information Security" Syngress 1-59749-115-2&lt;BR /&gt;"Cybersecurity Lessons from CoVID-19" CRC Press 978-0-367-68269-9&lt;BR /&gt;============= for back issues:&lt;BR /&gt;[Base URL] site &lt;A href="http://victoria.tc.ca/techrev/" target="_blank"&gt;http://victoria.tc.ca/techrev/&lt;/A&gt;&lt;BR /&gt;CISSP refs: [Base URL]mnbksccd.htm&lt;BR /&gt;PC Security: [Base URL]mnvrrvsc.htm&lt;BR /&gt;Security Dict.: [Base URL]secgloss.htm&lt;BR /&gt;Security Educ.: [Base URL]comseced.htm&lt;BR /&gt;Book reviews: [Base URL]mnbk.htm&lt;BR /&gt;[Base URL]review.htm&lt;BR /&gt;Partial/recent: &lt;A href="http://groups.yahoo.com/group/techbooks/" target="_blank"&gt;http://groups.yahoo.com/group/techbooks/&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://en.wikipedia.org/wiki/Robert_Slade" target="_blank"&gt;http://en.wikipedia.org/wiki/Robert_Slade&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank"&gt;https://is.gd/RotlWB&lt;/A&gt; &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;</description>
      <pubDate>Thu, 13 May 2021 17:46:30 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Wifi-and-FRAGAttacks/m-p/45475#M5459</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2021-05-13T17:46:30Z</dc:date>
    </item>
  </channel>
</rss>

