CEH EXAM OBJECTIVES COVERED IN THIS CHAPTER:
Overview of WEP, WPA authentication mechanisms, and cracking techniques
Overview of wireless sniffers and locating SSIDs, MAC spoofing
Understand rogue access points
Understand wireless hacking techniques
Describe the methods used to secure wireless networks
Because of the broadcast nature of radio frequency (RF) wireless networks and the rapid adoption of wireless technologies for home and business networks, many hacking opportunities exist in wireless networking. Even for organizations with a "no wireless" policy—meaning they do not support any Wi-Fi connectivity—rogue ...