| | Haunted by Legacy: Discovering and Exploiting Vulnerable Tunnelling Hosts [pdf] (mathyvanhoef.com) |
|
3 points by unkeen 88 days ago | past
|
| | TunnelCrack (mathyvanhoef.com) |
|
13 points by belter on Sept 1, 2023 | past | 1 comment
|
| | TunnelCrack (mathyvanhoef.com) |
|
2 points by husamia on Aug 17, 2023 | past
|
| | TunnelCrack flaws can expose VPN tunnel traffic (mathyvanhoef.com) |
|
17 points by arkadiyt on Aug 13, 2023 | past | 2 comments
|
| | Making the Cloudflare Warp VPN Leak DNS Requests (mathyvanhoef.com) |
|
2 points by arkadiyt on Aug 10, 2023 | past
|
| | TunnelCrack: Widespread design flaws in VPN clients (mathyvanhoef.com) |
|
2 points by harporoeder on Aug 9, 2023 | past | 1 comment
|
| | TunnelCrack, a combination of two widespread security vulnerabilities in VPNs (mathyvanhoef.com) |
|
10 points by willprice89 on Aug 9, 2023 | past | 1 comment
|
| | TunnelCrack: Widespread design flaws in VPN clients (mathyvanhoef.com) |
|
5 points by Reventlov on Aug 9, 2023 | past
|
| | TunnelCrack: Widespread design flaws in VPN clients (mathyvanhoef.com) |
|
14 points by todsacerdoti on Aug 8, 2023 | past
|
| | TunnelCrack: Leaking VPN Client Traffic by Abusing Routing Tables [pdf] (mathyvanhoef.com) |
|
6 points by jibcage on Aug 8, 2023 | past | 1 comment
|
| | On the Robustness of Wi-Fi Deauthentication Countermeasures [pdf] (mathyvanhoef.com) |
|
2 points by headalgorithm on Jan 27, 2023 | past
|
| | Providing source code when submitting papers: anonymous but protected access (mathyvanhoef.com) |
|
3 points by DyslexicAtheist on Sept 12, 2020 | past
|
| | New Results: WPA3 vulnerable to a second class of side-channel leaks (mathyvanhoef.com) |
|
22 points by sohkamyung on Aug 4, 2019 | past
|
| | Dragonblood – Analysing WPA3's Dragonfly Handshake (mathyvanhoef.com) |
|
1 point by sarnowski on April 12, 2019 | past
|
| | Dragonblood: Analysing WPA3's Dragonfly Handshake (mathyvanhoef.com) |
|
42 points by 0x0 on April 11, 2019 | past | 2 comments
|
| | Dragonblood – several design flaws discovered in WPA3 (mathyvanhoef.com) |
|
9 points by tomvangoethem on April 10, 2019 | past
|
| | Dragonblood: Analysing WPA3's Dragonfly Handshake (mathyvanhoef.com) |
|
10 points by tdrnd on April 10, 2019 | past
|
| | Release the Kraken: New KRACKs in the 802.11 Standard [pdf] (mathyvanhoef.com) |
|
1 point by ChrisCinelli on Oct 9, 2018 | past
|
| | WPA3: Technical Details and Discussion (mathyvanhoef.com) |
|
5 points by wrench4916 on March 12, 2018 | past | 2 comments
|
| | [dupe] Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 [pdf] (mathyvanhoef.com) |
|
65 points by 0x0 on Oct 16, 2017 | past | 1 comment
|
| | Defeating MAC Address Randomization Through Timing Attacks [pdf] (mathyvanhoef.com) |
|
46 points by wglb on July 16, 2017 | past | 1 comment
|
| | Why MAC address randomization is not enough (2016) [pdf] (mathyvanhoef.com) |
|
132 points by wglb on July 15, 2017 | past | 10 comments
|
| | Discovering Logical Vulnerabilities in the Wi-Fi Handshake [pdf] (mathyvanhoef.com) |
|
1 point by pjf on April 5, 2017 | past
|
| | Understanding the heap and exploiting heap overflows (2013) (mathyvanhoef.com) |
|
2 points by forrestbrazeal on Jan 23, 2017 | past
|
| | Your MAC Address Randomization attempts are futile [pdf] (mathyvanhoef.com) |
|
5 points by ashitlerferad on July 11, 2016 | past | 1 comment
|
| | How MAC Address Randomization Works on Windows 10 (and can be defeated) (mathyvanhoef.com) |
|
3 points by wolframio on April 12, 2016 | past
|
| | Exploiting 'INSERT INTO' SQL Injections Ninja Style (mathyvanhoef.com) |
|
2 points by cujanovic on March 5, 2016 | past
|
| | Jamming WiFi Using Cheap USB Dongles (mathyvanhoef.com) |
|
3 points by gipsies on Oct 15, 2015 | past
|
| | UCSB iCTF: Hacking Nuclear Plants and Pwning ASLR/NX (mathyvanhoef.com) |
|
1 point by omegga on April 7, 2013 | past
|
| | WhatsApp Considered Insecure (mathyvanhoef.com) |
|
2 points by gipsies on May 22, 2012 | past
|
|
|
More |