Wireless Network Hacking

In this chapter you will

•  Describe wireless network architecture and terminology

•  Identify wireless network types and forms of authentication

•  Describe wireless encryption algorithms

•  Identify wireless hacking methods and tools

•  Describe mobile platform attacks

•  Identify Mobile Device Management

Some people like love stories, some like mysteries, and some prefer watching explosions and gunfire in action movies. As for me, I am a certified horror movie nut. I love watching movies about monsters, ghosts, spooks, blood, and gore—just plain-old scarefests. One that got to me quite a bit when I was younger—even though it’s not really thought of as a true horror movie, I guess—was Poltergeist. And it ...

Get CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.