From the course: Ethical Hacking: Wireless Networks
Unlock the full course today
Join today to access over 25,200 courses taught by industry experts.
Configuring security in wireless networks - Linux Tutorial
From the course: Ethical Hacking: Wireless Networks
Configuring security in wireless networks
- [Instructor] Early wireless networks didn't employ encryption and were known as open networks, however, this meant that anyone could attach to the network, which had some significant risks. The first and most obvious is that this leads to additional local network traffic, and also potentially consumption of internet bandwidth and data allowance. A malicious attacker can use an open network as a launching point for attacks on other systems, so ensuring that any traceback and blame stops at the network they've accessed. Even more maliciously, however, being on the local network allows an attacker to use techniques such as app spoofing to attack network clients directly with exploits and through man-in-the-middle attacks. Security was first deployed on wireless systems in the form of the Wired Equivalent Privacy, or WEP. This was integrated into the 802.11b standard and was designed to protect wireless networks to the same…
Contents
-
-
-
Understanding wireless networks5m 52s
-
(Locked)
Selecting an antenna for wireless network testing5m 16s
-
(Locked)
Configuring security in wireless networks3m 26s
-
(Locked)
Understanding the Wi-Fi Protected Setup (WPS)5m 20s
-
(Locked)
Extracting WEP passwords using Wifite2m 9s
-
(Locked)
Extracting network passwords through WPS2m 35s
-
(Locked)
Using WiFite and Aircrack-ng to test WPA passwords2m
-
(Locked)
Using Pixiedust to recover keys2m 44s
-
(Locked)
A first look at WPA32m 26s
-
(Locked)
Understanding Dragonblood2m 37s
-
-
-
-
-
-