Skip to Content
Learn Ethical Hacking from Scratch
book

Learn Ethical Hacking from Scratch

by Zaid Sabih
July 2018
Beginner
564 pages
12h 22m
English
Packt Publishing
Content preview from Learn Ethical Hacking from Scratch

Post-connection attacks

Everything we've done so far has not involved us connecting to a network. In this section, we're going to be talking about post-connection attacks—in other words, attacks that we can do after connecting to a network. Now, it doesn't matter if this network is a wireless or a wired network, and it doesn't matter how we managed to connect to it. We're going to forget all about what we did so far, and we're just going to assume that we have a connection to the network. We could have just connected physically using a wire to the router or to the server, we could have managed to crack the key, if the target was using a WEP or WPA key, or perhaps the network was a wireless network that wasn't using any encryption, and we ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Learn Ethical Hacking From Scratch

Learn Ethical Hacking From Scratch

Zaid Sabih
Ethical Hacking Masterclass

Ethical Hacking Masterclass

SUNIL GUPTA (India), Sunil Gupta
Ethical Hacking

Ethical Hacking

Ric Messier
Ethical Hacking

Ethical Hacking

Daniel G. Graham

Publisher Resources

ISBN: 9781788622059Supplemental Content