Chapter 11. Wireless Hack Walkthrough

IN THIS CHAPTER

Now that you have had a look at the tools, techniques, and methods that hackers and security auditors use to penetrate or test wireless networks, it is time to put all of these ideas together. This chapter will outline the general steps an attacker might take to hack both your wireless network and the wired network beyond. The target will be a test network that we have set up just for this illustration. In other words, until a law as jejune and ludicrous as the DMCA applies to auditing, we are fully within legal and moral boundaries to perform these actions as it is our own equipment and bandwidth ...

Get Maximum Wireless Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.