Chapter 12 Wireless Security Risks

IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:

Unauthorized rogue access

Eavesdropping

Authentication attacks

Denial of Service (DoS) attacks

MAC spoofing

Wireless hijacking

Encryption cracking

Peer-to-Peer attacks

Management interface exploits

Vendor proprietary attacks

Social engineering

Physical damage and theft

Guest access and WLAN hotspots

802.11 wireless networking is inherently insecure due to the use of a shared and unbounded medium—radio frequency (RF) signals. Unlike traditional bounded, or wired, networks, the medium ...

Get CWSP, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.