In this chapter you will learn about
• Identifying wireless network architecture and terminology
• Identifying wireless network types and forms of authentication
• Describing WEP and WPA wireless encryption
• Identifying wireless hacking methods and tools
• Defining Bluetooth hacking methods
When I was a youngster, I remember one of my favorite places to run to in the local Wal-Mart was the automotive aisles. In addition to all the great stuff I could dream about saddling a car down with, they also had “police” ...