Key Features
Book Description
What you will learn
- Create a wireless lab for your experiments
- Sniff out wireless packets and hidden networks
- Capture and crack WPA2 keys
- Discover hidden SSIDs
- Explore the ins and outs of wireless technologies
- Sniff probe requests and track users through SSID history
- Attack radius authentication systems
- Sniff wireless traffic and collect interesting data
- Decrypt encrypted traffic with stolen keys
Who this book is for
Table of Contents
- Wireless Lab Set-up
- WLAN and Its Inherent Securities
- Bypassing WLAN Authentication
- WLAN Encryption Flaws
- Attacks on WLAN Infrastructure
- Attacking the Client
- Advanced WLAN Attacks
- Attacking WPA-Enterprise and RADIUS
- Wireless Testing Methodology
- WPS, Probes and Pineapples
Loading...
Loading...
Loading...
Loading...

