equal
deleted
inserted
replaced
11 %http://www.net.in.tum.de/fileadmin/TUM/teaching/netzsicherheit/ws1516/07_PKI.pdf |
11 %http://www.net.in.tum.de/fileadmin/TUM/teaching/netzsicherheit/ws1516/07_PKI.pdf |
12 |
12 |
13 %wifi-pumkin (real man-in-the-middle attacks) |
13 %wifi-pumkin (real man-in-the-middle attacks) |
14 %http://www.hackingarticles.in/hack-password-using-rogue-wi-fi-access-point-attack-wifi-pumpkin/ |
14 %http://www.hackingarticles.in/hack-password-using-rogue-wi-fi-access-point-attack-wifi-pumpkin/ |
15 %https://github.com/P0cL4bs/WiFi-Pumpkin |
15 %https://github.com/P0cL4bs/WiFi-Pumpkin |
|
16 |
|
17 %http://routersecurity.org/index.php |
16 |
18 |
17 \section*{Handout 5 (Protocols)} |
19 \section*{Handout 5 (Protocols)} |
18 |
20 |
19 Protocols are the computer science equivalent to fractals and |
21 Protocols are the computer science equivalent to fractals and |
20 the Mandelbrot set in mathematics. With the latter two you |
22 the Mandelbrot set in mathematics. With the latter two you |