官术网_书友最值得收藏!

Chapter 3. Bypassing WLAN Authentication

A false sense of security is worse than being insecure, as you may not be prepared to face the eventuality of being hacked.

WLANs can have weak authentication schemas that can be easily broken and bypassed. In this chapter, we will take a look at the various basic authentication schemas used in WLANs and learn how to beat them.

In this chapter, we will take a look at the following topics:

  • Uncovering hidden SSIDs
  • Beating MAC filters
  • Bypassing Open Authentication
  • Bypassing Shared Key Authentication (SKA)
主站蜘蛛池模板: 石景山区| 西林县| 巨野县| 西平县| 旅游| 杭州市| 开阳县| 共和县| 吉木乃县| 新田县| 蕉岭县| 垫江县| 绥江县| 沙雅县| 简阳市| 云南省| 岑溪市| 巩义市| 永靖县| 大英县| 栖霞市| 台安县| 普宁市| 乌海市| 台湾省| 浙江省| 璧山县| 黄大仙区| 灌云县| 奇台县| 东台市| 乌拉特后旗| 泉州市| 名山县| 嵩明县| 定兴县| 隆尧县| 轮台县| 沙坪坝区| 佛山市| 长乐市|