Chapter 3. Bypassing WLAN Authentication

A false sense of security is worse than being insecure, as you may not be prepared to face the eventuality of being hacked.
WLANs can have weak authentication schemas that can be easily broken and bypassed. In this chapter, we will take a look at the various basic authentication schemas used in WLANs and learn how to beat them.
In this chapter, we will take a look at the following topics:
- Uncovering hidden SSIDs
- Beating MAC filters
- Bypassing Open Authentication
- Bypassing Shared Key Authentication (SKA)
推薦閱讀
- Spring 5.0 Microservices(Second Edition)
- AngularJS Testing Cookbook
- LabVIEW2018中文版 虛擬儀器程序設(shè)計(jì)自學(xué)手冊
- Java 9 Programming Blueprints
- Mastering RStudio:Develop,Communicate,and Collaborate with R
- JAVA程序設(shè)計(jì)實(shí)驗(yàn)教程
- Java EE 8 Application Development
- Mastering Android Development with Kotlin
- Windows Phone 7.5:Building Location-aware Applications
- NoSQL數(shù)據(jù)庫原理
- Python深度學(xué)習(xí):模型、方法與實(shí)現(xiàn)
- Solr Cookbook(Third Edition)
- Clojure for Machine Learning
- 汽車人機(jī)交互界面整合設(shè)計(jì)
- Java圖像處理:基于OpenCV與JVM