O'Reilly logo

Hacking Exposed Wireless, Third Edition by Johnny Cache, Joshua Wright

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 3

ATTACKING 802.11 WIRELESS NETWORKS

Security on wireless networks has had a very checkered past. WEP, in particular, has been broken so many times that you would think people would quit getting worked up about it. This chapter covers tools and techniques to bypass security on networks prior to the use of Wi-Fi Protected Access (WPA). Where possible, attacks are presented on Linux, Windows, and OS X.

Basic Types of Attacks

Wireless network defenses fall into a few different categories. The first category—“totally ineffective,” otherwise known as security through obscurity—is trivial to break through for anyone who’s genuinely interested in doing so.

The next type of defense can be classified as “challenging.” Generally, WEP and ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required