Email address | private |
---|---|
First Active | 2011-10-01 |
Last Active | 2016-05-24 |
Whitepaper that discusses how Cisco IP Communicator only uses MAC addresses for authentication allowing you to spoof other callers.
5fa6355a4e3c274a002436a52e827eab9e6cbcae0ca0402c3a1c6a7211bbcdeb
This paper examines network layer security provided by IPSec and link layer security provided by WPA, addressing the characteristics of each approach when applied to wireless networks. It also discusses types of attack done on Wireless/Wi-Fi and security mitigations.
30f079292e126b6757e81232dfdb4f5e11ee01e8b0b8be39876b06cf34a9f6ae