O'Reilly logo

CEH® Certified Ethical Hacker Study Guide by Kimberly Graves

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Wireless Network Hacking

CEH EXAM OBJECTIVES COVERED IN THIS CHAPTER:

  • Overview of WEP, WPA authentication mechanisms, and cracking techniques

  • Overview of wireless sniffers and locating SSIDs, MAC spoofing

  • Understand rogue access points

  • Understand wireless hacking techniques

  • Describe the methods used to secure wireless networks

Wireless Network Hacking

Because of the broadcast nature of radio frequency (RF) wireless networks and the rapid adoption of wireless technologies for home and business networks, many hacking opportunities exist in wireless networking. Even for organizations with a "no wireless" policy—meaning they do not support any Wi-Fi connectivity—rogue ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required