sigmoid.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A social space for people researching, working with, or just interested in AI!

Server stats:

552
active users

#wirelesssecurity

1 post1 participant0 posts today
Marko Jahnke<p>Auch 2026 findet wieder ein <a href="https://bonn.social/tags/GI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GI</span></a>-SPRING-Graduiertenworkshop der Fachgruppe Security - Intrusion Detection and Response (SIDAR) statt. Diesmal am 21. und 22.04.2026 in <a href="https://bonn.social/tags/Heidelberg" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Heidelberg</span></a>. </p><p>Zu den Themen gehören <a href="https://bonn.social/tags/VulnerabilityAssessment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VulnerabilityAssessment</span></a>, <a href="https://bonn.social/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a>, <a href="https://bonn.social/tags/IntrusionDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IntrusionDetection</span></a>, <a href="https://bonn.social/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a>, <a href="https://bonn.social/tags/IncidentManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentManagement</span></a>, <a href="https://bonn.social/tags/WirelessSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WirelessSecurity</span></a>, <a href="https://bonn.social/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> usw.</p><p>Einreichungen werden bis zum 15.03.2026 angenommen.</p><p><a href="https://spring.fg-sidar.gi.de" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">spring.fg-sidar.gi.de</span><span class="invisible"></span></a></p><p><a href="https://bonn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://bonn.social/tags/Conference" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Conference</span></a></p>
Cyb3rk1d<p>🐉 Kali Linux 2025.3 Release — Vagrant, Nexmon &amp; NetHunter Love 🚀</p><p>Kali 2025.3 just dropped with a tidy set of quality-of-life updates and some neat platform improvements. The team refreshed how they build Vagrant images (moving the VM workflow away from Packer towards a cleaner build pipeline), making virtual images easier to manage for labs and CI. 🧩🖥️</p><p>A big win for wireless researchers: Nexmon support returns (Broadcom/Cypress chips), bringing monitor mode and injection support back to devices including Raspberry Pi models (now supporting Pi 5). That means more accessible packet capture and radio experiments on compact SBCs. 📡🐧</p><p>Kali is also trimming legacy support — dropping ARMel — and polishing desktop niceties like a configurable Xfce VPN-IP panel so multi-VPN users can choose which interface to show. 🌐🔧</p><p>New tools (10) were added to the repos — highlights include Caido, Detect It Easy (DiE), krbrelayx, ligolo-mp, llm-tools-nmap, and patchleaks — plus many package updates. Expect easier reverse/forensics workflows, Kerberos tooling, AI-cli helpers, and utilities to speed up patch validation. 🧰✨</p><p>Kali NetHunter also got attention: a Nexmon-enabled Samsung Galaxy S10 image (budget-friendly internal monitor + injection), CARsenal (car-hacking toolkit) updates and refactors, Magisk module support for kernel modules (experimental), and a raft of bug fixes/UI work for mobile tooling. 📱⚙️</p><p>ARM builds were refined (recommend arm64 Raspberry Pi images, Pi 5 support, kernel update fixes) and there are the usual documentation updates, community wallpapers, and repository tweaks. If you run Kali in lab or mobile setups, this release is worth testing. 🔁📚</p><p>⚠️ Disclaimer:<br>For educational &amp; authorized use only. Kali’s wireless/attack-capability features (monitor/injection, CARsenal, NetHunter) must be used responsibly in controlled labs or with explicit permission. </p><p><a href="https://defcon.social/tags/KaliLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KaliLinux</span></a> <a href="https://defcon.social/tags/Kali2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kali2025</span></a> <a href="https://defcon.social/tags/NetHunter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetHunter</span></a> <a href="https://defcon.social/tags/Nexmon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nexmon</span></a> <a href="https://defcon.social/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://defcon.social/tags/PenTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenTesting</span></a> <a href="https://defcon.social/tags/WirelessSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WirelessSecurity</span></a> <a href="https://defcon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://defcon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>
CosicBe<p>This summer, our researcher Nikola Antonijević attended <a href="https://mastodon.social/tags/WiSec2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WiSec2025</span></a> &amp; wrote a blog post on "Security in the Inaudible World" – challenges in inaudible communication 👇<br>🔗 <a href="https://www.esat.kuleuven.be/cosic/blog/wisec-2025-spotlight-security-in-the-inaudible-world/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">esat.kuleuven.be/cosic/blog/wi</span><span class="invisible">sec-2025-spotlight-security-in-the-inaudible-world/</span></a></p><p>Nikola also presented "ZeroTouch" at <a href="https://mastodon.social/tags/SACMAT2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SACMAT2025</span></a>, reinforcing RSS for secure geofencing 👇 <a href="https://www.esat.kuleuven.be/cosic/blog/zerotouch-reinforcing-rss-for-secure-geofencing/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">esat.kuleuven.be/cosic/blog/ze</span><span class="invisible">rotouch-reinforcing-rss-for-secure-geofencing/</span></a><br><a href="https://mastodon.social/tags/WirelessSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WirelessSecurity</span></a> <a href="https://mastodon.social/tags/Geofencing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Geofencing</span></a></p>
Cyb3rk1d<p>Wireless Security Protocols Explained: WEP, WPA, WPA2 &amp; WPA3 📡🔐</p><p>Understanding wireless security protocols is essential for protecting your network from unauthorized access and ensuring data confidentiality.</p><p>📘 Key Protocols &amp; Their Characteristics:</p><p>1. WEP (Wired Equivalent Privacy)<br>• Introduced in 1997<br>• Weak encryption (RC4), easily cracked<br>• Deprecated and insecure</p><p>2. WPA (Wi-Fi Protected Access)<br>• Interim solution after WEP<br>• Improved encryption with TKIP<br>• Still vulnerable to certain attacks</p><p>3. WPA2<br>• Widely used today<br>• Uses AES-based CCMP encryption<br>• Supports enterprise (RADIUS) and personal (PSK) modes</p><p>4. WPA3<br>• Latest standard with stronger security<br>• Resistant to brute-force attacks<br>• Supports SAE (Simultaneous Authentication of Equals)<br>• Enhanced encryption and forward secrecy</p><p>Why it matters:<br>Choosing the right wireless protocol significantly affects your network’s resilience against common attack vectors such as packet sniffing, replay attacks, and credential theft.</p><p>Disclaimer: This post is for educational and awareness purposes only. Always secure your wireless networks using the latest standards.</p><p><a href="https://defcon.social/tags/WirelessSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WirelessSecurity</span></a> <a href="https://defcon.social/tags/WPA3" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WPA3</span></a> <a href="https://defcon.social/tags/WEP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WEP</span></a> <a href="https://defcon.social/tags/WPA2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WPA2</span></a> <a href="https://defcon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://defcon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://defcon.social/tags/EducationOnly" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EducationOnly</span></a> <a href="https://defcon.social/tags/WiFiProtocols" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WiFiProtocols</span></a> <a href="https://defcon.social/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://defcon.social/tags/WiFiEncryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WiFiEncryption</span></a></p>
Cyb3rk1d<p>Wireless Penetration Testing Tools You Should Know 📡🔐</p><p>Wireless networks can be a critical attack surface if not properly secured. These tools are widely used in authorized lab environments to assess the strength of Wi-Fi configurations and encryption protocols.</p><p>Use cases include:<br>• Testing weak encryption (WEP/WPA)<br>• Detecting rogue access points<br>• Capturing and analyzing authentication handshakes<br>• Teaching wireless attack vectors in controlled labs</p><p>Disclaimer: This content is for educational and ethical use only. Wireless testing must only be performed on networks you own or have explicit authorization to audit.</p><p><a href="https://defcon.social/tags/WirelessSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WirelessSecurity</span></a> <a href="https://defcon.social/tags/WiFiPentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WiFiPentest</span></a> <a href="https://defcon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://defcon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://defcon.social/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EthicalHacking</span></a> <a href="https://defcon.social/tags/EducationOnly" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EducationOnly</span></a> <a href="https://defcon.social/tags/RedTeamTools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedTeamTools</span></a> <a href="https://defcon.social/tags/WirelessAuditing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WirelessAuditing</span></a> <a href="https://defcon.social/tags/AircrackNG" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AircrackNG</span></a> <a href="https://defcon.social/tags/WPA2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WPA2</span></a></p>
Jennifer (JJ) Minella<p><a href="https://infosec.exchange/tags/WLPC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WLPC</span></a> reg opens today and for the first time ever I submitted a 3-day Bootcamp training!! </p><p>Also the 2024 Deep Dive is updated for a deeper look at WPA3 including packet captures. </p><p>Teaching with <span class="h-card" translate="no"><a href="https://infosec.exchange/@subnetwork" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>subnetwork</span></a></span> </p><p><a href="https://infosec.exchange/tags/wifisecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wifisecurity</span></a> <a href="https://infosec.exchange/tags/wirelesssecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wirelesssecurity</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/networksecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networksecurity</span></a></p>