官术网_书友最值得收藏!

Chapter 3. Bypassing WLAN Authentication

A false sense of security is worse than being insecure, as you may not be prepared to face the eventuality of being hacked.

WLANs can have weak authentication schemas that can be easily broken and bypassed. In this chapter, we will take a look at the various basic authentication schemas used in WLANs and learn how to beat them.

In this chapter, we will take a look at the following topics:

  • Uncovering hidden SSIDs
  • Beating MAC filters
  • Bypassing Open Authentication
  • Bypassing Shared Key Authentication (SKA)
主站蜘蛛池模板: 沛县| 班玛县| 葵青区| 达州市| 华池县| 宁南县| 高碑店市| 津南区| 观塘区| 海口市| 靖西县| 响水县| 宕昌县| 宁德市| 天祝| 万盛区| 兰考县| 香港| 厦门市| 南丹县| 交城县| 阳信县| 申扎县| 巫山县| 富蕴县| 旌德县| 井研县| 台南县| 济宁市| 大理市| 井陉县| 瑞昌市| 丹巴县| 大埔区| 永寿县| 红桥区| 宜宾县| 屏山县| 安多县| 阿坝县| 通城县|