Chapter 3. Bypassing WLAN Authentication

A false sense of security is worse than being insecure, as you may not be prepared to face the eventuality of being hacked.
WLANs can have weak authentication schemas that can be easily broken and bypassed. In this chapter, we will take a look at the various basic authentication schemas used in WLANs and learn how to beat them.
In this chapter, we will take a look at the following topics:
- Uncovering hidden SSIDs
- Beating MAC filters
- Bypassing Open Authentication
- Bypassing Shared Key Authentication (SKA)
推薦閱讀
- 流量的秘密:Google Analytics網站分析與優化技巧(第2版)
- Mastering JavaScript Object-Oriented Programming
- iOS 9 Game Development Essentials
- 軟件測試項目實戰之性能測試篇
- HTML5游戲開發案例教程
- 用Python實現深度學習框架
- Functional Kotlin
- Linux操作系統基礎案例教程
- C#開發案例精粹
- Mastering Akka
- Julia 1.0 Programming Complete Reference Guide
- Hadoop 2.X HDFS源碼剖析
- Magento 2 Beginners Guide
- JSP程序設計與案例實戰(慕課版)
- Web程序設計:ASP.NET(第2版)