Skip to Content
Applied Network Security
book

Applied Network Security

by Warun Levesque, Arthur Salmon, Michael McLafferty
April 2017
Intermediate to advanced
350 pages
8h 35m
English
Packt Publishing
Content preview from Applied Network Security

Summary

After reading this chapter, you should now have a much better understanding of evil twins, address spoofing, rogue access points, and methods used to detect evil twin attacks. Unprotected wireless networks continue to be a favorite attack vector for hackers around the world. As we learned earlier in the chapter, most public wireless networks do not use encryption to secure network communication. That is why using virtual private networks is a much better option when using wireless networks. It is important to remember that even VPNs are vulnerable to evil twins, because if you use a VPN on public Wi-Fi you must first connect to the access point before logging into the VPN (using VPN software). If you log in to an evil twin, you could ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Applied Network Security Monitoring

Applied Network Security Monitoring

Chris Sanders, Jason Smith
Network Protocols for Security Professionals

Network Protocols for Security Professionals

Yoram Orzach, Deepanshu Khanna
Cyber Security and Network Security

Cyber Security and Network Security

Sabyasachi Pramanik, Debabrata Samanta, M. Vinay, Abhijit Guha

Publisher Resources

ISBN: 9781786466273