O'Reilly logo

Hacking Exposed™ Wireless by Vincent Liu, Joshua Wright, Johnny Cache

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 3ATTACKING 802.11 WIRELESS NETWORKS

Security on wireless networks has had a very checkered past. WEP, in particular, has been broken so many times that you would think people would quit getting all spun up about it. This chapter covers tools and techniques to bypass security on networks that are using everything short of WPA. Where possible, attacks are presented on Linux, Windows, and OS X.

BASIC TYPES OF ATTACKS

Wireless network defenses can fall into a few different categories. The first category—“totally ineffective,” otherwise known as security through obscurity—is trivial to break through for anyone who’s genuinely interested in doing so.

The next type of defense could be classified as “annoying.” Generally, WEP and a dictionary-based ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required