Chapter 7. Wireless Attacks

IN THIS CHAPTER

CAUTION

Disclaimer: Information presented in this book is to help you protect your own networks only. Consult with your company’s counsel, and be sure to get permission in writing from your supervisor, before attempting any of these techniques. This book provides examples of how hackers perform their attacks solely to help you anticipate them and to defend your wireless networks against them. You are responsible for knowing your local and regional laws and for obeying them at all times.

The techniques for wireless attacks are not new. Indeed, they are based on the ancient attacks that ...

Get Maximum Wireless Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.