Listen

Description

Malware Victim Selection Through WiFi Identification

https://isc.sans.edu/forums/diary/Malware+Victim+Selection+Through+WiFi+Identification/26910/

New Treck IP Stack Vulnerabilities

https://treck.com/vulnerability-response-information/

Detecting Treck IP Stack

https://github.com/Forescout/project-memoria-detector