Wireless Network Hacking
In this chapter you will
• Identify wireless network architecture and terminology
• Identify wireless network types and forms of authentication
• Describe WEP and WPA wireless encryption
• Identify wireless hacking methods and tools
• Define Bluetooth hacking methods
Some people like love stories, some like mysteries, and some prefer watching explosions and gunfire in action movies. As for me, I am a certified horror movie nut. I love watching movies about monsters, ghosts, spooks, blood, gore, and plain-old scarefests. ...