CHAPTER 3ATTACKING 802.11 WIRELESS NETWORKS

Security on wireless networks has had a very checkered past. WEP, in particular, has been broken so many times that you would think people would quit getting all spun up about it. This chapter covers tools and techniques to bypass security on networks that are using everything short of WPA. Where possible, attacks are presented on Linux, Windows, and OS X.

BASIC TYPES OF ATTACKS

Wireless network defenses can fall into a few different categories. The first category—“totally ineffective,” otherwise known as security through obscurity—is trivial to break through for anyone who’s genuinely interested in doing so.

The next type of defense could be classified as “annoying.” Generally, WEP and a dictionary-based ...

Get Hacking Exposed Wireless, Second Edition, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.