O'Reilly logo

BackTrack 5 Wireless Penetration Testing Beginner’s Guide by Vivek Ramachandran

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9, Wireless Penetrating Testing Methodology

Question

Answer

1)

d) It is non-trivial to detect rogue access points and using simple bindings like IP and MAC will not work in most cases.

2)

a) If the user has to approve every access point before a connecting to it, then most mis-association attacks could be prevented.

3)

d) A severe defect in an important device on the network would be the most important vulnerability to fix.

4)

c) The P option is for making airbase-ng respond to all probes.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required