December 2017
Intermediate to advanced
216 pages
6h 2m
English
The first attack we are going take a look at or re-examine in this particular chapter is the attack against the wired equivalent privacy, or WEP, protocol. We've encountered this protocol a few times in our journey through this book, and we're to take another look at it here, with some additional items added that weren't there before, and endeavor to expand on this attack so as to discuss the real weaknesses in this protocol that make it so vulnerable to attacks.
Read now
Unlock full access