Skip to Content
Ethical Hacking and Penetration Testing Guide
book

Ethical Hacking and Penetration Testing Guide

by Rafay Baloch
September 2017
Beginner
532 pages
13h 31m
English
Auerbach Publications
Content preview from Ethical Hacking and Penetration Testing Guide

Chapter 11Wireless Hacking

Introduction

Over time, many homes and organizations have moved toward wireless networks. One of the reasons people are switching to wireless networks is to overcome physical limitations. From a hacker’s perspective, wireless networks are an easy target; when compared with wired networks, they are easy to sniff and attack.

In this chapter, we will cover a wide variety of attacks that can be performed against a wireless network. We will start by discussing how to bypass a low-level security that a network administrator often implements, such as hiding SSID and enabling MAC filtering. After that, we will dive into the essence of this chapter, where I will demonstrate how easy it is to crack WEP/WPA/WPA preshared keys. ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Ethical Hacking

Ethical Hacking

Daniel G. Graham

Publisher Resources

ISBN: 9781351381345