首页> 外文会议>IEEE International Workshops on Enabling Technologies >ActiveSync TCP/IP and 802.11b wireless vulnerabilities of WinCE-based PDAs
【24h】

ActiveSync TCP/IP and 802.11b wireless vulnerabilities of WinCE-based PDAs

机译:ActiveSync TCP / IP和802.11b基于WinCE的PDA的无线漏洞

获取原文

摘要

Researching the vulnerabilities and security concerns of WinCE-based Personal Digital Assistants (PDAs) in an 802.11 wireless environment resulted in identifying CAN-2001-{0158 to 0163}. The full understanding and demonstration of some vulnerabilities would have required reverse engineering ActiveSync, which was beyond the scope of this research. Moreover, the WinCE IP stack demonstrated unstabilities under a number of attacks, one of which produced symptoms in hardware. The inaccessibility of the 802.11b standard documentation was a source of delays in the research; however, we created three proof-of-concept applications to defeat 802.11b security. One collects valid MAC addresses on the network, which defeats MAC-address-based restrictions. Another builds a code book using known-plaintext attacks, and the third decrypts 802.11b traffic on-the fly using the code book.
机译:在802.11无线环境中研究基于WinCE的个人数字助理(PDA)的漏洞和安全问题导致识别CAN-2001- {0158至0163}。一些漏洞的完整理解和演示将需要逆向工程ActiveSync,这超出了本研究的范围。此外,WinCE IP堆栈在许多攻击下展示了不可用,其中一个攻击是硬件中产生的症状。 802.11b标准文件的无法访问是研究的延迟源;但是,我们创建了三个概念验证应用程序,以击败802.11b的安全性。一个人收集网络上的有效MAC地址,这会破坏基于MAC地址的限制。另一个使用已知明文攻击构建代码簿,第三个解密的解密802.11b使用代码书的飞行。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号