Summary

Hacking is a complex endeavor. This chapter has attempted to bring together many of the book’s tools and concepts into an instructive example. As you can see in this chapter, our test network has several holes through which a hacker can walk. This is why security is paramount in a wireless setting.

A secure WLAN might have several layers of protection. For example, if a WLAN uses a firewall, VPN, WEP, and RADIUS, a hacker will be hard pressed to breach the network without stealing a laptop or mobile device that already has access to the WLAN—and even then, the hacker would need the user account information. This is why we always recommend layered security. Your wireless network deserves nothing less.

Get Maximum Wireless Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.