CHAPTER 7
Wireless Network Hacking
This chapter includes questions from the following topics:
• Describe wireless network architecture and terminology
• Identify wireless network types and forms of authentication
• Describe wireless encryption algorithms
• Identify wireless hacking methods and tools
Wireless networking icons are usually shown as some sort of beacon with circles (or half circles) emanating outward, like the waves of an ocean continuing out into the atmosphere to lap onto shores unseen. And that’s entirely appropriate, since the whole thing started in Hawaii. Well, at least the wireless data networking we’re discussing, anyway. The real story started way back in 1888.
While competing for the “Berlin Prize,” proposed ...
Get CEH Certified Ethical Hacker Practice Exams, Fifth Edition, 5th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.