March 2021
Intermediate to advanced
400 pages
14h 24m
English
© Cherezoff/Shutterstock
This chapter considers the threats and vulnerabilities that are directly associated with 802.11 wireless networks, their various topologies, and devices. It also looks at wireless local area network (WLAN) vulnerabilities within the context of Internet Protocol (IP) networking and how cyberthieves and hackers leverage WLANs as the “crack in the door” to the corporate networks they attack.
Wireless networks consist of radio cards that work together in a variety of configurations to form peer-to-peer WLAN infrastructures, bridges, repeaters, extenders, ...