Hacking Techniques in Wireless Networks
Prabhaker Mateti, Wright State University
Infrastructure and Ad Hoc Modes
Collecting the Frames for Cracking WEP
Wireless Security Best Practices
INTRODUCTION
Wireless networks broadcast their packets using radio frequency (RF) or optical wavelengths. A modern laptop computer can listen in. Worse, attackers can manufacture new packets on the fly and persuade wireless stations to accept their packets as legitimate. In this chapter, the term hacking is used as follows:
hacker n. [originally, someone who makes furniture with an axe] 1. A person ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.