March 2021
Intermediate to advanced
400 pages
14h 24m
English
Cybercriminals tend to seek out weak points that they discover in a network infrastructure or in a device’s hardware or OS. The weak points in a wireless network relate to the association and authentication of devices. In a wired network, much of this can be taken for granted, because a physical connection is required via a cable and switch. With a wireless network, this is not the case. Any device listening on the same 2.4 GHz or 5 GHz band can listen and perhaps negotiate an association and join the network.
In the early days of 802.11, wireless networks were easy to penetrate because encryption was weak and people didn’t understand best practices. Today, IT departments have good standards and better tools ...